首页 > 最新文献

2022 International Conference on Electronics and Renewable Systems (ICEARS)最新文献

英文 中文
Smart Home Automation Implemented using LabVIEW and Arduino 利用LabVIEW和Arduino实现智能家居自动化
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752265
Sanjay S Tippannavar, Shivaprasad N, P. S
The 21st century is an era of technology. Technology has undoubtedly changed the way of living. It has an impact on the lives and redefined the fact of living. The smart home can monitor the temperature, fire, water level, automatic door lock, PIR sensor along with IR sensor placed around the house to monitor the house which guarantees the family's safety, smoke sensor and non-contact water level controller. It comprises of a personal computer (PC) as the communication medium, including the LabVIEW software installed on the PC and the Arduino micro-controller board coded and integrated with sensors and voice synthesizers which provide feedback thus assuring & notifying the user about the Smart Home. Invention of this smart home gives us a safe, convenient, and fully automated system.
21世纪是科技的时代。科技无疑改变了人们的生活方式。它对生活产生了影响,并重新定义了生活的事实。智能家居可以监控温度、火灾、水位、自动门锁、PIR传感器以及放置在房子周围的红外传感器来监控房子,保证家庭的安全、烟雾传感器和非接触式水位控制器。它由一台个人计算机(PC)作为通信媒介,包括安装在PC上的LabVIEW软件和Arduino微控制器板,该微控制器板编码并集成了传感器和语音合成器,从而提供反馈,从而确保并通知用户有关智能家居。这种智能家居的发明给了我们一个安全、方便、全自动化的系统。
{"title":"Smart Home Automation Implemented using LabVIEW and Arduino","authors":"Sanjay S Tippannavar, Shivaprasad N, P. S","doi":"10.1109/ICEARS53579.2022.9752265","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752265","url":null,"abstract":"The 21st century is an era of technology. Technology has undoubtedly changed the way of living. It has an impact on the lives and redefined the fact of living. The smart home can monitor the temperature, fire, water level, automatic door lock, PIR sensor along with IR sensor placed around the house to monitor the house which guarantees the family's safety, smoke sensor and non-contact water level controller. It comprises of a personal computer (PC) as the communication medium, including the LabVIEW software installed on the PC and the Arduino micro-controller board coded and integrated with sensors and voice synthesizers which provide feedback thus assuring & notifying the user about the Smart Home. Invention of this smart home gives us a safe, convenient, and fully automated system.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Monitoring Of Industrial Electrical Equipments 工业电气设备监控
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9751843
A. Amudha, M. Siva Ramkumar, K. Balachander, G. Emayavaramban, G. N, S. S, Suresh Mt
There is a considerable chance of fire breakouts in industries such as petroleum, chemical, oils, & gas, resulting in massive devastation, destruction of livelihood, and the great majority of all, the loss of life. When an event happens, it's essential to have a mechanism in place that can alert authorized personnel and ensure that the premises are safe. In order to detect fires (via smoke as well as temperature sensors) and LPG leaks, an IOT-based industrial problem detection project was created. Data is sent to a remote location through the Internet of Things (IoT). 'Things' can communicate with sensors, circuits, programs, and accessibility through the Internet of Things (IOT). Human interaction is unnecessary for these technologies.(p)(p)Monitoring voltage and current consumption by industry is also a feature of this system. Use this tool to locate the hottest area, which may be assessed by determining the most hazardous area for people or production. A current sensor measures the overall amount of current consumed by the industrial sector. ' If the power exceeds the threshold and the load is tripped, the IOT cloud app will notify the appropriate person.
在石油、化工、石油和天然气等行业,发生火灾的可能性相当大,造成巨大的破坏,破坏生计,最重要的是造成生命损失。当事件发生时,必须有一种机制可以提醒授权人员并确保场所安全。为了检测火灾(通过烟雾和温度传感器)和液化石油气泄漏,创建了一个基于物联网的工业问题检测项目。数据通过物联网(IoT)发送到远程位置。“物”可以通过物联网(IOT)与传感器、电路、程序和可访问性进行通信。这些技术不需要人工干预。(p) (p)监测工业电压和电流消耗也是该系统的一个特点。使用此工具定位最热的区域,可以通过确定对人员或生产最危险的区域来评估。电流传感器可以测量工业部门消耗的总电流。”如果功率超过阈值,负载被触发,物联网云应用程序将通知相应的人员。
{"title":"Monitoring Of Industrial Electrical Equipments","authors":"A. Amudha, M. Siva Ramkumar, K. Balachander, G. Emayavaramban, G. N, S. S, Suresh Mt","doi":"10.1109/ICEARS53579.2022.9751843","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751843","url":null,"abstract":"There is a considerable chance of fire breakouts in industries such as petroleum, chemical, oils, & gas, resulting in massive devastation, destruction of livelihood, and the great majority of all, the loss of life. When an event happens, it's essential to have a mechanism in place that can alert authorized personnel and ensure that the premises are safe. In order to detect fires (via smoke as well as temperature sensors) and LPG leaks, an IOT-based industrial problem detection project was created. Data is sent to a remote location through the Internet of Things (IoT). 'Things' can communicate with sensors, circuits, programs, and accessibility through the Internet of Things (IOT). Human interaction is unnecessary for these technologies.(p)(p)Monitoring voltage and current consumption by industry is also a feature of this system. Use this tool to locate the hottest area, which may be assessed by determining the most hazardous area for people or production. A current sensor measures the overall amount of current consumed by the industrial sector. ' If the power exceeds the threshold and the load is tripped, the IOT cloud app will notify the appropriate person.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133223307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incorporating ESG in Decision Making for Responsible and Sustainable Investments using Machine Learning 利用机器学习将ESG纳入负责任和可持续投资的决策中
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752343
Ellia Twinamatsiko, Dinesh Kumar
Over the years, the number of firms measuring and reporting environmental, social, and governance data has seen a massive shift due to the overwhelming demand and pressure from different stakeholders. The introduction of various international regulatory bodies like the Corporate Sustainability Reporting Directive (CSRD), has also been intentional in encouraging companies to disclose publicly documents like annual reports, integrated reports in regards to topics like social, environmental, employee affairs and human rights. When it comes to investing, ESG issues take into account a firm’s operational influence on the native environment. Customers, policy makers, investors, and regulators are exerting huge amount of pressure on Companies to carry out Environmental, Social, and Governance ("ESG") reporting also known as non-financial reporting. Sustainability reporting has previously exhibited numerous advantages to businesses as accurate data collection and reporting are essential for managing the company’s sustainability performance as well as improving financial decision making. It is vital for a company’s long-term performance to actively disclose and communicate its non-financial practices and approaches. Therefore, in order to answer questions like; “Is it vital for developing market firms to disclose non-financial information, such as that relating to environmental, social, and governance (ESG)?”, this paper will attempt to provide a deeper insight into ESG disclosure and the impact it has on Firm Performance using Machine Learning techniques (Regression) and performance Ratios (Return On Assets & Return On Equity).
多年来,由于来自不同利益相关者的巨大需求和压力,衡量和报告环境、社会和治理数据的公司数量发生了巨大变化。引入各种国际监管机构,如企业可持续发展报告指令(CSRD),也有意鼓励公司公开披露年度报告等文件,以及有关社会、环境、员工事务和人权等主题的综合报告。在投资方面,ESG问题考虑到公司对当地环境的运营影响。客户、政策制定者、投资者和监管机构对公司施加了巨大的压力,要求公司执行环境、社会和治理(“ESG”)报告,也称为非财务报告。可持续发展报告以前对企业展示了许多优势,因为准确的数据收集和报告对于管理公司的可持续发展绩效以及改善财务决策至关重要。积极披露和沟通其非财务实践和方法对公司的长期业绩至关重要。因此,为了回答这样的问题;“发展中市场公司披露非财务信息,如与环境、社会和治理(ESG)有关的信息,这是否至关重要?”,本文将尝试使用机器学习技术(回归)和绩效比率(资产回报率和股本回报率)更深入地了解ESG披露及其对公司绩效的影响。
{"title":"Incorporating ESG in Decision Making for Responsible and Sustainable Investments using Machine Learning","authors":"Ellia Twinamatsiko, Dinesh Kumar","doi":"10.1109/ICEARS53579.2022.9752343","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752343","url":null,"abstract":"Over the years, the number of firms measuring and reporting environmental, social, and governance data has seen a massive shift due to the overwhelming demand and pressure from different stakeholders. The introduction of various international regulatory bodies like the Corporate Sustainability Reporting Directive (CSRD), has also been intentional in encouraging companies to disclose publicly documents like annual reports, integrated reports in regards to topics like social, environmental, employee affairs and human rights. When it comes to investing, ESG issues take into account a firm’s operational influence on the native environment. Customers, policy makers, investors, and regulators are exerting huge amount of pressure on Companies to carry out Environmental, Social, and Governance (\"ESG\") reporting also known as non-financial reporting. Sustainability reporting has previously exhibited numerous advantages to businesses as accurate data collection and reporting are essential for managing the company’s sustainability performance as well as improving financial decision making. It is vital for a company’s long-term performance to actively disclose and communicate its non-financial practices and approaches. Therefore, in order to answer questions like; “Is it vital for developing market firms to disclose non-financial information, such as that relating to environmental, social, and governance (ESG)?”, this paper will attempt to provide a deeper insight into ESG disclosure and the impact it has on Firm Performance using Machine Learning techniques (Regression) and performance Ratios (Return On Assets & Return On Equity).","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133451755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of 5G Network Architecture with Interoperability in Heterogeneous Wireless Environment using Radio Spectrum 利用无线电频谱实现异构无线环境下具有互操作性的5G网络架构
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752267
P. William, Siddhartha Choubey, M. Ramkumar, Apurv Verma, K. Vengatesan, Abha Choubey
In this study, we suggest a revolutionary network architectural design strategy for future 5G mobile networks, which we believe would be beneficial. The proposed design is based on a mobile environment that is centered on the user and incorporates a range of wireless and mobile technologies to achieve this. Because it is impossible to make changes to any wireless technology, new or old, in a heterogeneous wireless environment, each solution for next-generation mobile and wireless networks should be implemented in the service stratum, whereas radio access technologies should be implemented in the transport stratum in the Next-Generation Networks approach. The user terminal in the proposed design has the option of altering the Radio Access Technology - RAT based on the parameters that have been supplied. This paper introduces the Policy-Router, which is a node in the core network that constructs IP tunnels to the mobile terminal across many available RATs to the terminal, while enabling the mobile terminal to change RATs in an unobtrusive manner. After learning about the RAT via the mobile terminal's performance measurements, the mobile terminal selects the RAT by executing a multi-criteria decision-making process using the specified user agent. In this paper, we describe the QoSPRO methodology, which allows control information to be shared between the mobile terminal and the Policy Router throughout the performance evaluation procedure.
在这项研究中,我们为未来的5G移动网络提出了一种革命性的网络架构设计策略,我们相信这将是有益的。提出的设计基于以用户为中心的移动环境,并结合了一系列无线和移动技术来实现这一目标。由于在异构无线环境中不可能对任何新的或旧的无线技术进行更改,因此下一代移动和无线网络的每种解决方案都应在服务层中实现,而在下一代网络方法中,无线电接入技术应在传输层中实现。所提设计中的用户终端具有基于已提供的参数改变无线接入技术- RAT的选项。本文介绍了策略路由器(Policy-Router),它是一个在核心网络中的节点,它跨越多个可用的rat构建到移动终端的IP隧道,同时使移动终端能够以不显眼的方式改变rat。通过移动终端的性能测量了解RAT后,移动终端使用指定的用户代理执行多标准决策过程来选择RAT。在本文中,我们描述了QoSPRO方法,该方法允许在整个性能评估过程中在移动终端和策略路由器之间共享控制信息。
{"title":"Implementation of 5G Network Architecture with Interoperability in Heterogeneous Wireless Environment using Radio Spectrum","authors":"P. William, Siddhartha Choubey, M. Ramkumar, Apurv Verma, K. Vengatesan, Abha Choubey","doi":"10.1109/ICEARS53579.2022.9752267","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752267","url":null,"abstract":"In this study, we suggest a revolutionary network architectural design strategy for future 5G mobile networks, which we believe would be beneficial. The proposed design is based on a mobile environment that is centered on the user and incorporates a range of wireless and mobile technologies to achieve this. Because it is impossible to make changes to any wireless technology, new or old, in a heterogeneous wireless environment, each solution for next-generation mobile and wireless networks should be implemented in the service stratum, whereas radio access technologies should be implemented in the transport stratum in the Next-Generation Networks approach. The user terminal in the proposed design has the option of altering the Radio Access Technology - RAT based on the parameters that have been supplied. This paper introduces the Policy-Router, which is a node in the core network that constructs IP tunnels to the mobile terminal across many available RATs to the terminal, while enabling the mobile terminal to change RATs in an unobtrusive manner. After learning about the RAT via the mobile terminal's performance measurements, the mobile terminal selects the RAT by executing a multi-criteria decision-making process using the specified user agent. In this paper, we describe the QoSPRO methodology, which allows control information to be shared between the mobile terminal and the Policy Router throughout the performance evaluation procedure.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133755655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Object Detection using TensorFlow 使用TensorFlow进行对象检测
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752263
yellamma pachipala, M. Harika, B. Aakanksha, M. Kavitha
Objects in the home that are often used tend to follow specific patterns in terms of time and location. Analyzing these trends can help us keep track of our belongings and increase efficiency by reducing the amount of time wasted forgetting or looking for them. Tensor Flow, a relatively new framework from Google, was utilised to model our neural network in our project. Multiple objects in real-time video streams are detected using the Tensor Flow Object Detection API. The system then detects trends and alerts the user if an abnormality is discovered. Finding REMO—detecting relative mobility patterns in geographic lifelines is a study reported by Laube et al. A neural network model is constructed and trained with the goal of being able to accurately identify digits from handwritten photographs. For this, the Tensor Flow syntax was employed, using Keras as the front end. The trained model can take an image of a handwritten digit as input and predict the digit's class, that is, it can predict the digit or the input picture's class. Machine vision improvements, in combination with a camera and artificial intelligence programming, may now be used by PCs to recognize images.
家里经常使用的物品往往在时间和地点方面遵循特定的模式。分析这些趋势可以帮助我们跟踪我们的物品,通过减少浪费在忘记或寻找它们上的时间来提高效率。张量流是谷歌的一个相对较新的框架,在我们的项目中用于建模我们的神经网络。使用张量流对象检测API检测实时视频流中的多个对象。然后,系统检测趋势,并在发现异常时提醒用户。Laube等人报道了在地理生命线中寻找远程检测相对流动性模式的研究。为了能够准确地从手写照片中识别数字,构建并训练了一个神经网络模型。为此,使用了Tensor Flow语法,使用Keras作为前端。训练后的模型可以将手写数字的图像作为输入并预测数字的类别,即可以预测数字或输入图片的类别。机器视觉的改进,结合摄像头和人工智能编程,现在可能被pc用来识别图像。
{"title":"Object Detection using TensorFlow","authors":"yellamma pachipala, M. Harika, B. Aakanksha, M. Kavitha","doi":"10.1109/ICEARS53579.2022.9752263","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752263","url":null,"abstract":"Objects in the home that are often used tend to follow specific patterns in terms of time and location. Analyzing these trends can help us keep track of our belongings and increase efficiency by reducing the amount of time wasted forgetting or looking for them. Tensor Flow, a relatively new framework from Google, was utilised to model our neural network in our project. Multiple objects in real-time video streams are detected using the Tensor Flow Object Detection API. The system then detects trends and alerts the user if an abnormality is discovered. Finding REMO—detecting relative mobility patterns in geographic lifelines is a study reported by Laube et al. A neural network model is constructed and trained with the goal of being able to accurately identify digits from handwritten photographs. For this, the Tensor Flow syntax was employed, using Keras as the front end. The trained model can take an image of a handwritten digit as input and predict the digit's class, that is, it can predict the digit or the input picture's class. Machine vision improvements, in combination with a camera and artificial intelligence programming, may now be used by PCs to recognize images.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132345427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Approach towards Network Security of an Organization 组织网络安全的改进方法
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9751998
R. Vijaya Saraswathi, Sk Iftequar Ahmed, M. Sriveda Reddy, S. Akshay, M. Vrushik Reddy, M. Sanjana Reddy
More and more publicly available servers are becoming vulnerable to unauthenticated and unauthorized accesses, and intrusions are becoming much more common. As the size and number of networks and the Internet traffic expands, the requirement for intrusion detection grows, as does the need to reduce the burden associated with intrusion detection. Not only is it vital for a network/server administrator to ensure client performance, but it is also important to prevent unwanted access. The rise in the number of network threats is becoming a serious concern and detecting them is becoming increasingly more difficult. And the demand for a more advanced and logical intrusion detection system is growing at a rapid pace. The high rate of false/fake alarms is a fundamental flaw in existing systems. Honeypots can be a good way to improve the network’s overall dependability and security in this situation. Therefore, a self-improving approach towards security of the organizations can greatly help in tackling this kind of unauthorized accesses and data breaches. By the term self-improving, it means all the fixes are incorporated for the latest vulnerabilities found by using the attacker’s knowledge
越来越多的公共服务器容易受到未经身份验证和未经授权的访问,入侵也变得越来越普遍。随着网络的规模和数量以及Internet流量的增长,对入侵检测的需求也在增长,同时也需要减少与入侵检测相关的负担。对于网络/服务器管理员来说,确保客户机性能不仅至关重要,而且防止不必要的访问也很重要。网络威胁数量的增加正成为一个严重的问题,检测它们变得越来越困难。对更先进、更符合逻辑的入侵检测系统的需求正在快速增长。高误报率是现有系统的一个根本缺陷。在这种情况下,蜜罐可以很好地提高网络的整体可靠性和安全性。因此,组织安全的自我改进方法可以极大地帮助处理这种未经授权的访问和数据泄露。所谓自我改进,是指利用攻击者的知识发现的最新漏洞的所有修复程序都被纳入其中
{"title":"An Improved Approach towards Network Security of an Organization","authors":"R. Vijaya Saraswathi, Sk Iftequar Ahmed, M. Sriveda Reddy, S. Akshay, M. Vrushik Reddy, M. Sanjana Reddy","doi":"10.1109/ICEARS53579.2022.9751998","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751998","url":null,"abstract":"More and more publicly available servers are becoming vulnerable to unauthenticated and unauthorized accesses, and intrusions are becoming much more common. As the size and number of networks and the Internet traffic expands, the requirement for intrusion detection grows, as does the need to reduce the burden associated with intrusion detection. Not only is it vital for a network/server administrator to ensure client performance, but it is also important to prevent unwanted access. The rise in the number of network threats is becoming a serious concern and detecting them is becoming increasingly more difficult. And the demand for a more advanced and logical intrusion detection system is growing at a rapid pace. The high rate of false/fake alarms is a fundamental flaw in existing systems. Honeypots can be a good way to improve the network’s overall dependability and security in this situation. Therefore, a self-improving approach towards security of the organizations can greatly help in tackling this kind of unauthorized accesses and data breaches. By the term self-improving, it means all the fixes are incorporated for the latest vulnerabilities found by using the attacker’s knowledge","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Logical Data Security Establishment over Wireless Communications using Media based Steganographic Scheme 一种基于媒体隐写的无线通信逻辑数据安全机制
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752183
I. Chandra, Mohana Sundari L, N. Ashok Kumar, Ngangbam Phalguni Singh, Joshuva Arockia Dhanraj
Internet speeds and technological advancements have made individuals increasingly concerned about their personal information being compromised by criminals. There have been a slew of new steganography and data concealment methods suggested in recent years. Steganography is the art of hiding information in plain sight (text, audio, image and video). Unauthorized users now have access to steganographic analysis software, which may be used to retrieve the carrier files valuable secret information. Unfortunately, because to their inefficiency and lack of security, certain steganography techniques are readily detectable by steganalytical detectors. We present a video steganography technique based on the linear block coding concept that is safe and secure. Data is protected using a binary graphic logo but also nine uncompressed video sequences as cover data and a secret message. It's possible to enhance the security by rearranging pixels randomly in both the cover movies and the hidden message. Once the secret message has been encoded using the Hamming algorithm (7, 4) before being embedded, the message is even more secure. The XOR function will be used to add the encoded message's result to a random set of values. Once the message has been sufficiently secured, it may be inserted into the video frames of the cover. In addition, each frame's embedding region is chosen at random so that the steganography scheme's resilience can be improved. In addition, our experiments have shown that the approach has a high embedding efficiency. The video quality of stego movies is quite close to the original, with a PSNR (Pick Signal to Noise Ratio) over 51 dB. Embedding a payload of up to 90 Kbits per frame is also permissible, as long as the quality of the stego video is not noticeably degraded.
互联网的速度和技术的进步使个人越来越担心他们的个人信息被犯罪分子窃取。近年来,出现了一系列新的隐写和数据隐藏方法。隐写术是将信息隐藏在显而易见的地方(文本、音频、图像和视频)的艺术。未经授权的用户现在可以访问隐写分析软件,这可能被用来检索载体文件有价值的秘密信息。不幸的是,由于其效率低下和缺乏安全性,某些隐写技术很容易被隐写检测器检测到。提出了一种安全可靠的基于线性分组编码的视频隐写技术。数据保护使用二进制图形标识,但也有九个未压缩的视频序列作为掩护数据和秘密消息。可以通过在封面电影和隐藏信息中随机重新排列像素来增强安全性。一旦秘密消息在嵌入之前使用汉明算法(7,4)进行编码,消息就更加安全了。XOR函数将用于将编码消息的结果添加到一组随机值中。一旦信息得到充分保护,就可以插入封面的视频帧中。此外,每帧的嵌入区域都是随机选择的,从而提高了隐写方案的弹性。实验结果表明,该方法具有较高的嵌入效率。隐写电影的视频质量非常接近原版,PSNR(拾取信噪比)超过51 dB。嵌入每帧90 kb的有效载荷也是允许的,只要隐写视频的质量没有明显下降。
{"title":"A Logical Data Security Establishment over Wireless Communications using Media based Steganographic Scheme","authors":"I. Chandra, Mohana Sundari L, N. Ashok Kumar, Ngangbam Phalguni Singh, Joshuva Arockia Dhanraj","doi":"10.1109/ICEARS53579.2022.9752183","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752183","url":null,"abstract":"Internet speeds and technological advancements have made individuals increasingly concerned about their personal information being compromised by criminals. There have been a slew of new steganography and data concealment methods suggested in recent years. Steganography is the art of hiding information in plain sight (text, audio, image and video). Unauthorized users now have access to steganographic analysis software, which may be used to retrieve the carrier files valuable secret information. Unfortunately, because to their inefficiency and lack of security, certain steganography techniques are readily detectable by steganalytical detectors. We present a video steganography technique based on the linear block coding concept that is safe and secure. Data is protected using a binary graphic logo but also nine uncompressed video sequences as cover data and a secret message. It's possible to enhance the security by rearranging pixels randomly in both the cover movies and the hidden message. Once the secret message has been encoded using the Hamming algorithm (7, 4) before being embedded, the message is even more secure. The XOR function will be used to add the encoded message's result to a random set of values. Once the message has been sufficiently secured, it may be inserted into the video frames of the cover. In addition, each frame's embedding region is chosen at random so that the steganography scheme's resilience can be improved. In addition, our experiments have shown that the approach has a high embedding efficiency. The video quality of stego movies is quite close to the original, with a PSNR (Pick Signal to Noise Ratio) over 51 dB. Embedding a payload of up to 90 Kbits per frame is also permissible, as long as the quality of the stego video is not noticeably degraded.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115563583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Power Optimized Ternary Arithmetic Logic Circuit using Carbon Nano Tube Field Effect Transistor 基于碳纳米管场效应晶体管的功率优化三元算术逻辑电路
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752391
A. Latha, S. Murugeswaran, G. Yamuna
Ternary Logic Circuits have gained the crucial attention of all the semiconductor researchers as it provides better interconnect, power, performance and speed when compared to the conventional binary logics. There is a minimal area overhead in ternary logics but that’s permissible as long as other parameters provide a much beneficial results. Carbon Nano Tube (CNT) Transistors are a remarkable replacement for the conventional Complementary Metal Oxide Semiconductors (CMOS) as they exhibit better electrical connectivity, structural abilities and mechanical properties. The main focus of present-day requirements are designing and developing power optimized high speed circuits without compromising on performance and area. So, to achieve all these, this research work focus on combining both the high-profile techniques to build Low Powered Ternary Arithmetic Logic Circuits (LP- TALCs) using CNT transistors. ALCs plays the major role as the basic operating unit for any processors or circuits which helps to perform arithmetic operations and logic operations in single structure. The various logic operations performed by this TALC circuit is Buffer, Inversion, Ternary NAND, Ternary NOR, Ternary AND, Ternary OR, Ternary Adder, Ternary Subtractor and Ternary Comparator. The structure basically consists of Low Power Enabled Decoder (LPED), Functional modules and Output selection circuit (OSC). LPED circuit helps to achieve low power by enabling the selected circuit operations using decoder circuits and the inputs are fed to functional modules which consists of all the logical structure and finally the output selection circuit consists of encoders which deliver the final output function. The proposed structure is designed using 32nm CNTFET technology and the simulation results shows almost 90% power reduction to their binary counterpart and 85% Power delay product improvement.
与传统的二进制逻辑相比,三元逻辑电路具有更好的互连性、功耗、性能和速度,因此受到了所有半导体研究人员的高度关注。在三元逻辑中有一个最小的面积开销,但只要其他参数提供非常有益的结果,这是允许的。碳纳米管(CNT)晶体管是传统互补金属氧化物半导体(CMOS)的重要替代品,因为它们具有更好的电连通性、结构能力和机械性能。当前需求的主要焦点是设计和开发功率优化的高速电路,而不影响性能和面积。因此,为了实现这一切,本研究工作的重点是将这两种高水平的技术结合起来,利用碳纳米管晶体管构建低功耗三元算术逻辑电路(LP- TALCs)。alc作为任何处理器或电路的基本操作单元起着主要作用,它有助于在单一结构中执行算术运算和逻辑运算。该TALC电路执行的各种逻辑运算是缓冲、反转、三元非与、三元非与、三元与、三元或、三元加、三元减、三元比较。该结构主要由低功耗译码器(LPED)、功能模块和输出选择电路(OSC)组成。LPED电路通过使用解码器电路使所选电路操作能够帮助实现低功耗,输入被馈送到由所有逻辑结构组成的功能模块,最后输出选择电路由提供最终输出功能的编码器组成。该结构采用32nm CNTFET技术设计,仿真结果表明,与二进制结构相比,该结构功耗降低近90%,功耗延迟产品改善85%。
{"title":"Power Optimized Ternary Arithmetic Logic Circuit using Carbon Nano Tube Field Effect Transistor","authors":"A. Latha, S. Murugeswaran, G. Yamuna","doi":"10.1109/ICEARS53579.2022.9752391","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752391","url":null,"abstract":"Ternary Logic Circuits have gained the crucial attention of all the semiconductor researchers as it provides better interconnect, power, performance and speed when compared to the conventional binary logics. There is a minimal area overhead in ternary logics but that’s permissible as long as other parameters provide a much beneficial results. Carbon Nano Tube (CNT) Transistors are a remarkable replacement for the conventional Complementary Metal Oxide Semiconductors (CMOS) as they exhibit better electrical connectivity, structural abilities and mechanical properties. The main focus of present-day requirements are designing and developing power optimized high speed circuits without compromising on performance and area. So, to achieve all these, this research work focus on combining both the high-profile techniques to build Low Powered Ternary Arithmetic Logic Circuits (LP- TALCs) using CNT transistors. ALCs plays the major role as the basic operating unit for any processors or circuits which helps to perform arithmetic operations and logic operations in single structure. The various logic operations performed by this TALC circuit is Buffer, Inversion, Ternary NAND, Ternary NOR, Ternary AND, Ternary OR, Ternary Adder, Ternary Subtractor and Ternary Comparator. The structure basically consists of Low Power Enabled Decoder (LPED), Functional modules and Output selection circuit (OSC). LPED circuit helps to achieve low power by enabling the selected circuit operations using decoder circuits and the inputs are fed to functional modules which consists of all the logical structure and finally the output selection circuit consists of encoders which deliver the final output function. The proposed structure is designed using 32nm CNTFET technology and the simulation results shows almost 90% power reduction to their binary counterpart and 85% Power delay product improvement.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality Assessment and Grading of Milk using Sensors and Neural Networks 基于传感器和神经网络的牛奶质量评价与分级
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752269
J. Swarup Kumar, D. Indira, K. Srinivas, M. N. Satish Kumar
Every person's primary source of nutrition comes from milk. Adulterants should not be found in milk that is of high quality. In most cases, local shopkeepers and supermarket shops alike sell milk. Nevertheless, the local milk merchants utilise a slew of adulterants in their product, changing the composition of milk forever. The usage of degraded milk can lead to major health problems. The milk must therefore be tested for the presence of necessary parameters and any adulterants that have been added to it in order to ensure the quality of the milk. Here, sensors are employed to estimate several factors, such as pH, turbidity and colour. Similarly, the milk sector should be able to transmit the administration continuous data on milk quality during the production of milk bundles using the Neural Network model to help combat illegal items like poor milk quality.
每个人的主要营养来源都来自牛奶。高质量的牛奶不应该掺假。在大多数情况下,当地的店主和超市都卖牛奶。然而,当地的牛奶商人在他们的产品中使用了大量的掺假物,永远改变了牛奶的成分。饮用变质的牛奶会导致严重的健康问题。因此,为了保证牛奶的质量,必须检测牛奶中是否存在必要的参数和添加的任何掺假物。在这里,传感器被用来估计几个因素,如pH值,浊度和颜色。同样,牛奶行业应该能够使用神经网络模型向管理部门传输牛奶质量的连续数据,以帮助打击劣质牛奶等非法物品。
{"title":"Quality Assessment and Grading of Milk using Sensors and Neural Networks","authors":"J. Swarup Kumar, D. Indira, K. Srinivas, M. N. Satish Kumar","doi":"10.1109/ICEARS53579.2022.9752269","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752269","url":null,"abstract":"Every person's primary source of nutrition comes from milk. Adulterants should not be found in milk that is of high quality. In most cases, local shopkeepers and supermarket shops alike sell milk. Nevertheless, the local milk merchants utilise a slew of adulterants in their product, changing the composition of milk forever. The usage of degraded milk can lead to major health problems. The milk must therefore be tested for the presence of necessary parameters and any adulterants that have been added to it in order to ensure the quality of the milk. Here, sensors are employed to estimate several factors, such as pH, turbidity and colour. Similarly, the milk sector should be able to transmit the administration continuous data on milk quality during the production of milk bundles using the Neural Network model to help combat illegal items like poor milk quality.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Brain Tumor Detection On MR Images Using Improved Support Vector Machine 基于改进支持向量机的MR图像脑肿瘤检测
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752093
N. Bodapati, Ala Divya, N. Triveni, Narahari Indiradevi, Koppuravuri Yamini
The brain may be the most important organ in the human body. Memory, vision, hearing, and other senses are all under its control, as are personality traits and the ability to judge one's own strengths and weaknesses. There are many different types of tumors, some of which can lead to cancerous growths in the brain. Tumors are most commonly caused by the stalled growth of brain cells. With the aid of automatic tumor detection algorithms using Magnetic Resonance Imaging, the most deadly brain tumor can be diagnosed quickly and accurately. Radiation imaging provides detailed information on human tissue, which aids in tumor diagnosis. The clinical device's ability to determine a tumor's location relies heavily on accurate segmentation of the Magnetic Resonance Image picture. An Magnetic Resonance Imaging scan is used to examine the patient's medical status. The goal of this work is to devise the best method for detecting tumors on brain Magnetic Resonance Imaging scans and, if that proves to be the case, to determine whether the neoplasm is benign or malignant. Once these systems are applied to Magnetic Resonance images, it takes no time at all to make a neoplasm prediction, and the subsequent accuracy makes treating patients much easier. The radiologist can make quick decisions with the help of these predictions. K-means clustering method is then used to divide the brain into distinct tissues.. This method shows promise in the classification of a variety of disorders using a certain style of Magnetic Resonance images.
大脑可能是人体中最重要的器官。记忆、视觉、听觉和其他感官都在它的控制之下,人格特征和判断自己优缺点的能力也在它的控制之下。有许多不同类型的肿瘤,其中一些会导致大脑癌变。肿瘤最常见的原因是脑细胞生长停滞。借助磁共振成像的自动肿瘤检测算法,可以快速准确地诊断出最致命的脑肿瘤。放射成像提供人体组织的详细信息,有助于肿瘤的诊断。临床设备确定肿瘤位置的能力在很大程度上依赖于对磁共振图像图像的准确分割。磁共振成像扫描用于检查病人的医疗状况。这项工作的目标是设计出在脑磁共振成像扫描中检测肿瘤的最佳方法,如果证明是这样的话,确定肿瘤是良性的还是恶性的。一旦将这些系统应用于磁共振成像,就完全不需要时间来预测肿瘤,随后的准确性使治疗患者变得容易得多。放射科医生可以在这些预测的帮助下快速做出决定。然后使用K-means聚类方法将大脑划分为不同的组织。这种方法在使用某种类型的磁共振图像对各种疾病进行分类方面显示出希望。
{"title":"Brain Tumor Detection On MR Images Using Improved Support Vector Machine","authors":"N. Bodapati, Ala Divya, N. Triveni, Narahari Indiradevi, Koppuravuri Yamini","doi":"10.1109/ICEARS53579.2022.9752093","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752093","url":null,"abstract":"The brain may be the most important organ in the human body. Memory, vision, hearing, and other senses are all under its control, as are personality traits and the ability to judge one's own strengths and weaknesses. There are many different types of tumors, some of which can lead to cancerous growths in the brain. Tumors are most commonly caused by the stalled growth of brain cells. With the aid of automatic tumor detection algorithms using Magnetic Resonance Imaging, the most deadly brain tumor can be diagnosed quickly and accurately. Radiation imaging provides detailed information on human tissue, which aids in tumor diagnosis. The clinical device's ability to determine a tumor's location relies heavily on accurate segmentation of the Magnetic Resonance Image picture. An Magnetic Resonance Imaging scan is used to examine the patient's medical status. The goal of this work is to devise the best method for detecting tumors on brain Magnetic Resonance Imaging scans and, if that proves to be the case, to determine whether the neoplasm is benign or malignant. Once these systems are applied to Magnetic Resonance images, it takes no time at all to make a neoplasm prediction, and the subsequent accuracy makes treating patients much easier. The radiologist can make quick decisions with the help of these predictions. K-means clustering method is then used to divide the brain into distinct tissues.. This method shows promise in the classification of a variety of disorders using a certain style of Magnetic Resonance images.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115600789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2022 International Conference on Electronics and Renewable Systems (ICEARS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1