首页 > 最新文献

2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

英文 中文
IoT Enabled Prescription Reading Smart Medicine Dispenser Implementing Maximally Stable Extremal Regions and OCR 支持物联网的处方阅读智能配药器,实现最稳定的极端区域和OCR
Roisul Islam Rumi, Monirul Islam Pavel, Ekhwan Islam, Mohsinul Bari Shakir, M. A. Hossain
The concept of the Internet of Things (IoT) integrated with embedded system and new technologies in the healthcare sector has opened a new era. The natural decrease in physical condition of senior citizens with aging prompts and expansion in frequencies of different diseases, for that reason they need to take medicine on time to improve their health conditions. In this research work we are focusing on the circumstances of senior citizens, we have proposed an IoT enabled smart medicine box equipped with camera for scanning the prescription. After the system scans the prescription through camera, a number of preprocessing techniques are applied on the prescription for better extraction of information. Following that, we applied Maximally Stable Extremal Regions (MSER). Later, string manipulation is done on the extracted text and relevant information is uploaded in the database. Afterwards, our medicine box uses the information to notify the patient using buzzer and shows the medication information on the LCD display. A patient has to verify his identity using fingerprint to take the medicine. Finally, the medicine box dispenses specific medicines and updates the consumption time in the database. Our system will also notify the patient if the dispenser is getting low on medicine using the display by showing message.
与嵌入式系统和新技术相结合的物联网(IoT)概念在医疗保健领域开启了一个新时代。随着年龄的增长,老年人身体状况的自然下降促使各种疾病的发生频率增加,因此他们需要及时服药以改善健康状况。在这项研究工作中,我们专注于老年人的情况,我们提出了一个物联网智能药箱,配备了扫描处方的摄像头。系统通过摄像头对处方进行扫描后,对处方进行一系列预处理技术,以便更好地提取信息。随后,我们应用了最大稳定极值区域(MSER)。随后,对提取的文本进行字符串操作,并将相关信息上传到数据库中。然后,我们的药箱使用蜂鸣器通知患者,并在液晶显示屏上显示用药信息。病人必须用指纹验证身份才能服药。最后,药箱分配特定的药物并更新数据库中的消耗时间。我们的系统还会通过显示信息来通知患者,如果配药器的药物不足。
{"title":"IoT Enabled Prescription Reading Smart Medicine Dispenser Implementing Maximally Stable Extremal Regions and OCR","authors":"Roisul Islam Rumi, Monirul Islam Pavel, Ekhwan Islam, Mohsinul Bari Shakir, M. A. Hossain","doi":"10.1109/I-SMAC47947.2019.9032709","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032709","url":null,"abstract":"The concept of the Internet of Things (IoT) integrated with embedded system and new technologies in the healthcare sector has opened a new era. The natural decrease in physical condition of senior citizens with aging prompts and expansion in frequencies of different diseases, for that reason they need to take medicine on time to improve their health conditions. In this research work we are focusing on the circumstances of senior citizens, we have proposed an IoT enabled smart medicine box equipped with camera for scanning the prescription. After the system scans the prescription through camera, a number of preprocessing techniques are applied on the prescription for better extraction of information. Following that, we applied Maximally Stable Extremal Regions (MSER). Later, string manipulation is done on the extracted text and relevant information is uploaded in the database. Afterwards, our medicine box uses the information to notify the patient using buzzer and shows the medication information on the LCD display. A patient has to verify his identity using fingerprint to take the medicine. Finally, the medicine box dispenses specific medicines and updates the consumption time in the database. Our system will also notify the patient if the dispenser is getting low on medicine using the display by showing message.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Review on RFID based Image recognition for Driver Eligibility and Car Security 基于RFID的驾驶员资格与汽车安全图像识别研究进展
S. Malathi, J. Preethi
In the current world, the usage of car transportation has been increasing rapidly. Adults without proper identity are involved in road transportation, which leads to accidents and becomes a significant concern in our country. World Health Organization surveyed traffic collisions, India has the highest fatality rate of 16.6 per 100,000 people of which Tamil Nadu has more number of road collisions for a decade, and Chennai has more crashes in India than any other city. Based on the scenario of accidents and car thefts, various technologies have been designed for reducing the accident rate and also for identifying the car theft on average. Many researchers take several safety measures with recent technologies such as the clonal selection algorithm, artificial fish swarm algorithm, and intelligent car security system. Recognition of numbers in the license plate plays a significant role in identifying the car theft. This paper describes a detailed review on various technologies through which burglary of the car can be detected, and the rate of accidents can also be controlled.
在当今世界,汽车交通工具的使用一直在迅速增加。在道路运输过程中,无合法身份的成年人参与其中,导致交通事故的发生,已成为我国社会普遍关注的问题。世界卫生组织调查了交通事故,印度的死亡率最高,每10万人中有16.6人死亡,其中泰米尔纳德邦十年来的道路交通事故数量最多,金奈是印度交通事故最多的城市。基于事故和汽车盗窃的场景,设计了各种技术来降低事故率和识别平均汽车盗窃。许多研究者利用克隆选择算法、人工鱼群算法、智能汽车安全系统等最新技术采取了多种安全措施。车牌号码的识别在识别汽车盗窃案中起着重要的作用。本文详细介绍了各种技术,通过这些技术可以检测汽车的盗窃行为,并控制事故率。
{"title":"A Review on RFID based Image recognition for Driver Eligibility and Car Security","authors":"S. Malathi, J. Preethi","doi":"10.1109/I-SMAC47947.2019.9032476","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032476","url":null,"abstract":"In the current world, the usage of car transportation has been increasing rapidly. Adults without proper identity are involved in road transportation, which leads to accidents and becomes a significant concern in our country. World Health Organization surveyed traffic collisions, India has the highest fatality rate of 16.6 per 100,000 people of which Tamil Nadu has more number of road collisions for a decade, and Chennai has more crashes in India than any other city. Based on the scenario of accidents and car thefts, various technologies have been designed for reducing the accident rate and also for identifying the car theft on average. Many researchers take several safety measures with recent technologies such as the clonal selection algorithm, artificial fish swarm algorithm, and intelligent car security system. Recognition of numbers in the license plate plays a significant role in identifying the car theft. This paper describes a detailed review on various technologies through which burglary of the car can be detected, and the rate of accidents can also be controlled.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129567215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image Compression and Sparsity Measurement by using Multilevel and Different Wavelet Functions 基于多级和不同小波函数的图像压缩和稀疏度测量
Abhilasha Sharma, S. Bhadauria, Rekha Gupta
This paper proposes the image compression techniques by using multilevel wavelet transform with different wavelet filters and sparsity measurement, which is the essential requirement in the arena of Compressive Sensing (CS). CS is an innovative technique, which is used to state that one can reconstruct the signals from considerably fewer samples as compared to the customary method called Nyquist Sampling theorem. When a vector or matrix has mostly zero pixel value, then it is called sparsity of a matrix and multilevel wavelet transform is used for this purpose.
本文提出了基于不同小波滤波器和稀疏度测量的多级小波变换图像压缩技术,这是压缩感知领域的基本要求。CS是一种创新技术,与奈奎斯特采样定理相比,它可以从更少的样本中重建信号。当一个向量或矩阵的像素值基本为零时,称为矩阵的稀疏性,多电平小波变换用于此目的。
{"title":"Image Compression and Sparsity Measurement by using Multilevel and Different Wavelet Functions","authors":"Abhilasha Sharma, S. Bhadauria, Rekha Gupta","doi":"10.1109/I-SMAC47947.2019.9032708","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032708","url":null,"abstract":"This paper proposes the image compression techniques by using multilevel wavelet transform with different wavelet filters and sparsity measurement, which is the essential requirement in the arena of Compressive Sensing (CS). CS is an innovative technique, which is used to state that one can reconstruct the signals from considerably fewer samples as compared to the customary method called Nyquist Sampling theorem. When a vector or matrix has mostly zero pixel value, then it is called sparsity of a matrix and multilevel wavelet transform is used for this purpose.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129815886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Transmission Line Fault Classification Using Superimposed Components 利用叠加分量进行输电线路故障分类
P. Pattanaik, B. Panigrahi, S. Pati, S. K. Sanyal, J. J. Mahakud
This paper presents fault classification technique based on superimposed components of current signals. The classifier refers sequence networks of different fault type for developing classification logics. The superimposed sequences of current data are used to determine fault type and faulted phases that are selected through superimposed components of phase currents. This method is tested with different system conditions and effect of fault resistance, fault location, fault inception angle and load angle variation are studied. A two terminal 50 Hz system in Matlab®/Simulink™ environment is considered for simulation. The proposed algorithm is easy to implement in microprocessor based relay.
提出了基于电流信号叠加分量的故障分类技术。分类器指的是不同故障类型的序列网络,用于发展分类逻辑。电流数据的叠加序列通过相电流的叠加分量来确定故障类型和选择故障相位。在不同的系统条件下对该方法进行了测试,研究了故障电阻、故障定位、故障始角和负载角度变化对该方法的影响。考虑在Matlab®/Simulink™环境下对两端50 Hz系统进行仿真。该算法易于在基于微处理器的继电器中实现。
{"title":"Transmission Line Fault Classification Using Superimposed Components","authors":"P. Pattanaik, B. Panigrahi, S. Pati, S. K. Sanyal, J. J. Mahakud","doi":"10.1109/I-SMAC47947.2019.9032706","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032706","url":null,"abstract":"This paper presents fault classification technique based on superimposed components of current signals. The classifier refers sequence networks of different fault type for developing classification logics. The superimposed sequences of current data are used to determine fault type and faulted phases that are selected through superimposed components of phase currents. This method is tested with different system conditions and effect of fault resistance, fault location, fault inception angle and load angle variation are studied. A two terminal 50 Hz system in Matlab®/Simulink™ environment is considered for simulation. The proposed algorithm is easy to implement in microprocessor based relay.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121229686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BSSID based Monitoring Class Attendance System Using WiFi 基于BSSID的WiFi考勤监控系统
M Zahid Hasan, Dipto Saha, J. Ferdosh, Fernaz Narin Nur, Nazmun Nessa Moon, M. Saifuzzaman
Recent advancements in wireless technologies have evolved the growth of smart systems in day to day life. Nowadays, people are using WiFi connectivity for accessing the Internet or local hub inside home or office. A smart phone based checking system for monitoring class attendance through WiFi signal is developed in this work. Student, Teacher & Admin need to be installing the application. Most challenging part in this system is to make software design and send notification in smartphone. When Admin set specific time and students Smartphone connected with specific WiFi that time then they get notification for class attendance.
无线技术的最新进步促进了智能系统在日常生活中的发展。现在,人们在家里或办公室里使用WiFi连接来访问互联网或本地中心。本课题开发了一种基于智能手机的WiFi信号考勤系统。学生,教师和管理员需要安装应用程序。该系统最具挑战性的部分是在智能手机上进行软件设计和通知发送。当管理员设置特定的时间,学生的智能手机连接到特定的WiFi时,他们就会收到上课的通知。
{"title":"BSSID based Monitoring Class Attendance System Using WiFi","authors":"M Zahid Hasan, Dipto Saha, J. Ferdosh, Fernaz Narin Nur, Nazmun Nessa Moon, M. Saifuzzaman","doi":"10.1109/I-SMAC47947.2019.9032699","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032699","url":null,"abstract":"Recent advancements in wireless technologies have evolved the growth of smart systems in day to day life. Nowadays, people are using WiFi connectivity for accessing the Internet or local hub inside home or office. A smart phone based checking system for monitoring class attendance through WiFi signal is developed in this work. Student, Teacher & Admin need to be installing the application. Most challenging part in this system is to make software design and send notification in smartphone. When Admin set specific time and students Smartphone connected with specific WiFi that time then they get notification for class attendance.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Study of Distnict Image Encryption Techniques 不同图像加密技术的研究
K. Swetha, Sai Saaketh Sharma K, A Sai Niteesh, O Sai Sumith, K. Madhuri
Image Encryption is one of the most underrated encryption types available, about which no exposure was given. While Steganography is hiding plain text in an image, image encryption is encrypting the image itself with help of pixels present. Image encryption can be done in many ways like image to base64, image to binary (basic levels) but the real encryption is done using public and private keys. Few of the Encryption techniques like “Chaotic Map Sequence”, “Image Encryption using Matlab”, “Image Encryption using Python” involve the use of keys like public and private. Photo authentication methods are attempting to transform the unique picture to a picture that is hard to retrieve. Security is a significant issue in the correspondence and handling of pictures with the ever growing multimedia applications. Various methods are utilized in every now and then to scramble pictures so as to make them more secure. In this paper, image encryption based on python and a low-complexity cryptographic algorithm known as Secure Force with Affine Transformation was suggested along with “Chaotic Map Sequence” for future references. The encryption segment can be executed by utilizing straightforward design by comprising just of fundamental numerical tasks (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This can decrease the weight on the encoder, as the more confounded key extension technique is just performed on the decoder. The plan of this paper is to play out the proposed calculation's security investigation and execution assessment. Results of the proposed algorithm was checked on different types of images and comparative analysis was provided with other techniques.
图像加密是最被低估的加密类型之一,它没有被曝光。隐写术是将纯文本隐藏在图像中,而图像加密是借助存在的像素对图像本身进行加密。图像加密可以通过多种方式完成,比如从图像到base64,从图像到二进制(基本级别),但真正的加密是使用公钥和私钥完成的。像“混沌映射序列”、“使用Matlab的图像加密”、“使用Python的图像加密”这样的加密技术很少涉及公钥和私钥的使用。照片身份验证方法试图将唯一的图片转换为难以检索的图片。随着多媒体应用的不断发展,图像通信和图像处理的安全性问题日益突出。为了使图片更加安全,人们不时地使用各种方法对图片进行加密。本文提出了基于python的图像加密和一种低复杂度的仿射变换安全力加密算法,并提出了“混沌映射序列”以供今后参考。加密段可以通过使用简单的设计来执行,只需包含基本的数值任务(AND, OR, XOR, XNOR, shift, swap)。这可以减少编码器的权重,因为更复杂的密钥扩展技术只是在解码器上执行。本文的计划是对所提出的计算进行安全调查和执行评估。在不同类型的图像上验证了算法的结果,并与其他技术进行了对比分析。
{"title":"A Study of Distnict Image Encryption Techniques","authors":"K. Swetha, Sai Saaketh Sharma K, A Sai Niteesh, O Sai Sumith, K. Madhuri","doi":"10.1109/I-SMAC47947.2019.9032635","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032635","url":null,"abstract":"Image Encryption is one of the most underrated encryption types available, about which no exposure was given. While Steganography is hiding plain text in an image, image encryption is encrypting the image itself with help of pixels present. Image encryption can be done in many ways like image to base64, image to binary (basic levels) but the real encryption is done using public and private keys. Few of the Encryption techniques like “Chaotic Map Sequence”, “Image Encryption using Matlab”, “Image Encryption using Python” involve the use of keys like public and private. Photo authentication methods are attempting to transform the unique picture to a picture that is hard to retrieve. Security is a significant issue in the correspondence and handling of pictures with the ever growing multimedia applications. Various methods are utilized in every now and then to scramble pictures so as to make them more secure. In this paper, image encryption based on python and a low-complexity cryptographic algorithm known as Secure Force with Affine Transformation was suggested along with “Chaotic Map Sequence” for future references. The encryption segment can be executed by utilizing straightforward design by comprising just of fundamental numerical tasks (AND, OR, XOR, XNOR, SHIFTING, SWAPPING). This can decrease the weight on the encoder, as the more confounded key extension technique is just performed on the decoder. The plan of this paper is to play out the proposed calculation's security investigation and execution assessment. Results of the proposed algorithm was checked on different types of images and comparative analysis was provided with other techniques.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence of Internet of Things Technology on Intelligent Training Research under the Background of Healthy China 健康中国背景下物联网技术对智能训练的影响研究
Liying Shen, Hongyu Liu
The increasing influence of Internet of Things in the intelligent training research under the background of the healthy china is presented in this paper. In this regard, we firstly optimize the traditional IoT system. In the process of construction, various networks have formed many heterogeneous IoT due to the different hardware devices, software modules and even programming methods. We give the 2 core major modifications. (1) Re-design the function call and load mode for the cache feature of the function page. The register relative addressing mode is used instead of the direct addressing mode. By centrally managing the function address in the function page, the read and write operations caused by the cache function page can be effectively reduced. (2) The algorithm based on function page between transfer relations establishment mapping structure drawing, and analyzes each function page using the markov chain in the preliminary stage the possibility which renews, may enhance effectively promotes continuously the preliminary stage buffer hit probability. Then, we apply the idea with the healthy china construction. The intelligent system for the health monitoring is presented. The simulation results prove that the proposed model has the satisfactory performance.
本文阐述了在健康中国背景下,物联网在智能训练研究中日益增长的影响力。对此,我们首先对传统物联网系统进行优化。在构建过程中,各种网络由于硬件设备、软件模块甚至编程方法的不同,形成了许多异构物联网。我们给了两个核心主要的修改。(1)针对函数页的缓存特性,重新设计函数调用和加载模式。使用寄存器相对寻址模式代替直接寻址模式。通过在功能页集中管理功能地址,可以有效减少由于缓存功能页导致的读写操作。(2)该算法基于功能页之间的传递关系建立映射结构绘图,并利用马尔可夫链分析各个功能页在前期更新的可能性,可以有效地提高前期缓冲区的连续命中概率。然后,将其应用到健康中国的建设中。介绍了一种智能健康监测系统。仿真结果表明,该模型具有令人满意的性能。
{"title":"Influence of Internet of Things Technology on Intelligent Training Research under the Background of Healthy China","authors":"Liying Shen, Hongyu Liu","doi":"10.1109/I-SMAC47947.2019.9032594","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032594","url":null,"abstract":"The increasing influence of Internet of Things in the intelligent training research under the background of the healthy china is presented in this paper. In this regard, we firstly optimize the traditional IoT system. In the process of construction, various networks have formed many heterogeneous IoT due to the different hardware devices, software modules and even programming methods. We give the 2 core major modifications. (1) Re-design the function call and load mode for the cache feature of the function page. The register relative addressing mode is used instead of the direct addressing mode. By centrally managing the function address in the function page, the read and write operations caused by the cache function page can be effectively reduced. (2) The algorithm based on function page between transfer relations establishment mapping structure drawing, and analyzes each function page using the markov chain in the preliminary stage the possibility which renews, may enhance effectively promotes continuously the preliminary stage buffer hit probability. Then, we apply the idea with the healthy china construction. The intelligent system for the health monitoring is presented. The simulation results prove that the proposed model has the satisfactory performance.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123128223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction and Automation of Road Traffic using Internet of Things 基于物联网的道路交通预测与自动化
P. Vijayaraman, P. Jayarin
Road traffic causes a lot of inconvenience to the society and environment at an unexpected level. The amount of time being wasted at traffic signals could save a lot of human hours which in turn could help the productivity of the country. The consequences of road traffic not just wastes human hours but pollute the environment at a very high level. Thus addressing road traffic issues could save the economy, people's health and the environment. These will bring in changes like better living conditions and sustainable development in society. This paper proposes an Internet of Things based solution to effectively handle the heavy road traffic conditions.
道路交通给社会和环境带来了许多意想不到的不便。浪费在交通信号灯上的时间可以节省大量的人力时间,这反过来又有助于国家的生产力。道路交通的后果不仅浪费了人类的时间,而且严重污染了环境。因此,解决道路交通问题可以挽救经济、人民健康和环境。这些将带来诸如更好的生活条件和社会可持续发展等变化。本文提出了一种基于物联网的解决方案,以有效地处理繁忙的道路交通状况。
{"title":"Prediction and Automation of Road Traffic using Internet of Things","authors":"P. Vijayaraman, P. Jayarin","doi":"10.1109/I-SMAC47947.2019.9032489","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032489","url":null,"abstract":"Road traffic causes a lot of inconvenience to the society and environment at an unexpected level. The amount of time being wasted at traffic signals could save a lot of human hours which in turn could help the productivity of the country. The consequences of road traffic not just wastes human hours but pollute the environment at a very high level. Thus addressing road traffic issues could save the economy, people's health and the environment. These will bring in changes like better living conditions and sustainable development in society. This paper proposes an Internet of Things based solution to effectively handle the heavy road traffic conditions.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115298511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Denial Of Service(DDoS) Mitigation in Software Defined Network using Blockchain 使用区块链的软件定义网络中的分布式拒绝服务(DDoS)缓解
N. Giri, Rahul Jaisinghani, Rohit Kriplani, Tarun Ramrakhyani, V. Bhatia
A DDoS attack is a spiteful attempt to disrupt legitimate traffic to a server by overwhelming the target with a flood of requests from geographically dispersed systems. Today attackers prefer DDoS attack methods to disrupt target services as they generate GBs to TBs of random data to flood the target. In existing mitigation strategies, because of lack of resources and not having the flexibility to cope with attacks by themselves, they are not considered to be that effective. So effective DDoS mitigation techniques can be provided using emerging technologies such as blockchain and SDN(Software-Defined Networking). We propose an architecture where a smart contract is deployed in a private blockchain, which facilitates a collaborative DDoS mitigation architecture across multiple network domains. Blockchain application is used as an additional security service. With Blockchain, shared protection is enabled among all hosts. With help of smart contracts, rules are distributed among all hosts. In addition, SDN can effectively enable services and security policies dynamically. This mechanism provides ASes(Autonomous Systems) the possibility to deploy their own DPS(DDoS Prevention Service) and there is no need to transfer control of the network to the third party. This paper focuses on the challenges of protecting a hybridized enterprise from the ravages of rapidly evolving Distributed Denial of Service(DDoS) attack.
DDoS攻击是一种恶意的尝试,通过使用来自地理上分散的系统的大量请求来压倒目标,从而破坏到服务器的合法流量。如今,攻击者更喜欢使用DDoS攻击方法来破坏目标服务,因为它们会生成gb到tb的随机数据来淹没目标。在现有的缓解战略中,由于缺乏资源和缺乏自行应对攻击的灵活性,它们被认为没有那么有效。因此,可以使用区块链和SDN(软件定义网络)等新兴技术提供有效的DDoS缓解技术。我们提出了一种架构,其中智能合约部署在私有区块链中,从而促进跨多个网络域的协作DDoS缓解架构。区块链应用程序被用作额外的安全服务。使用区块链,在所有主机之间启用共享保护。在智能合约的帮助下,规则在所有主机之间分发。此外,SDN还可以有效地动态启用业务和安全策略。这种机制为自治系统提供了部署自己的DPS(DDoS防御服务)的可能性,并且不需要将网络控制权转移给第三方。本文重点讨论了保护混合企业免受快速发展的分布式拒绝服务(DDoS)攻击的挑战。
{"title":"Distributed Denial Of Service(DDoS) Mitigation in Software Defined Network using Blockchain","authors":"N. Giri, Rahul Jaisinghani, Rohit Kriplani, Tarun Ramrakhyani, V. Bhatia","doi":"10.1109/I-SMAC47947.2019.9032690","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032690","url":null,"abstract":"A DDoS attack is a spiteful attempt to disrupt legitimate traffic to a server by overwhelming the target with a flood of requests from geographically dispersed systems. Today attackers prefer DDoS attack methods to disrupt target services as they generate GBs to TBs of random data to flood the target. In existing mitigation strategies, because of lack of resources and not having the flexibility to cope with attacks by themselves, they are not considered to be that effective. So effective DDoS mitigation techniques can be provided using emerging technologies such as blockchain and SDN(Software-Defined Networking). We propose an architecture where a smart contract is deployed in a private blockchain, which facilitates a collaborative DDoS mitigation architecture across multiple network domains. Blockchain application is used as an additional security service. With Blockchain, shared protection is enabled among all hosts. With help of smart contracts, rules are distributed among all hosts. In addition, SDN can effectively enable services and security policies dynamically. This mechanism provides ASes(Autonomous Systems) the possibility to deploy their own DPS(DDoS Prevention Service) and there is no need to transfer control of the network to the third party. This paper focuses on the challenges of protecting a hybridized enterprise from the ravages of rapidly evolving Distributed Denial of Service(DDoS) attack.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130652465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Exploiting Sensor Fusion for Mobile Robot Localization 基于传感器融合的移动机器人定位
Harshita Agarwal, Pankaj Tiwari, R. Tiwari
When we attempt to trace a mobile robot relative to its surroundings, this phenomenon is delineated as Robot localization. Localization is regarded as most significant task for an independent robot on the basis of knowledge of the robot's location, decisions about future actions can be derived. In this paper we propose an approach to determine accurate position of mobile robotic devices by integrating data received from different kind of sensors. We use data from accelerometers, gyroscopes and low-cost encoders to get information about robot traffic.
当我们试图跟踪移动机器人相对于其周围环境时,这种现象被描述为机器人定位。定位被认为是独立机器人最重要的任务,在了解机器人位置的基础上,可以得出关于未来行动的决策。在本文中,我们提出了一种通过整合来自不同类型传感器的数据来确定移动机器人设备精确位置的方法。我们使用来自加速度计、陀螺仪和低成本编码器的数据来获取机器人的交通信息。
{"title":"Exploiting Sensor Fusion for Mobile Robot Localization","authors":"Harshita Agarwal, Pankaj Tiwari, R. Tiwari","doi":"10.1109/I-SMAC47947.2019.9032653","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032653","url":null,"abstract":"When we attempt to trace a mobile robot relative to its surroundings, this phenomenon is delineated as Robot localization. Localization is regarded as most significant task for an independent robot on the basis of knowledge of the robot's location, decisions about future actions can be derived. In this paper we propose an approach to determine accurate position of mobile robotic devices by integrating data received from different kind of sensors. We use data from accelerometers, gyroscopes and low-cost encoders to get information about robot traffic.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125368723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1