Pub Date : 2021-11-27DOI: 10.1109/i-PACT52855.2021.9696931
A. V. Ramana, B. Kumar
Design of security systems for Personal Health Record (PHR) continuous to remain an active research area. Machine Learning and Big data on health care are used for prediction of data or diseases. But there is no traditional system which id used to secure the data and provide emergency access in emergency conditions. PHR is a private and secure record of any individual through which an individual could access, manage and share his/her health data. In hospital management systems, there is an opportunity of sharing PHRs by the hospitals, doctors or workers for his/her private profit so there is no secure record management for restricting the unauthorized access to providing details in emergency circumstances for accessing his/her PHR. The major goal of this project is to provide security to clinical data by a secure record management ledger and provide different levels of abstraction with limited access permissions using some granular access rules on smart contracts on PHR using blockchain. For emergency access we gave some permissioned access rules to the PHR dependent on emergency PHR information that patient can control access for the record using grant and revoke permissions to any doctor. We analyse the proposed framework's overall performance using Hyperledger fabric which is permissioned block chain dependent on security, privacy and accessibility and response time.
{"title":"Decentralized Secure Personal Health Record Monitoring System using Blockchain","authors":"A. V. Ramana, B. Kumar","doi":"10.1109/i-PACT52855.2021.9696931","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696931","url":null,"abstract":"Design of security systems for Personal Health Record (PHR) continuous to remain an active research area. Machine Learning and Big data on health care are used for prediction of data or diseases. But there is no traditional system which id used to secure the data and provide emergency access in emergency conditions. PHR is a private and secure record of any individual through which an individual could access, manage and share his/her health data. In hospital management systems, there is an opportunity of sharing PHRs by the hospitals, doctors or workers for his/her private profit so there is no secure record management for restricting the unauthorized access to providing details in emergency circumstances for accessing his/her PHR. The major goal of this project is to provide security to clinical data by a secure record management ledger and provide different levels of abstraction with limited access permissions using some granular access rules on smart contracts on PHR using blockchain. For emergency access we gave some permissioned access rules to the PHR dependent on emergency PHR information that patient can control access for the record using grant and revoke permissions to any doctor. We analyse the proposed framework's overall performance using Hyperledger fabric which is permissioned block chain dependent on security, privacy and accessibility and response time.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.1109/i-PACT52855.2021.9696580
P. Prasad, C. Dhanamjayulu
The Multi-Level Inverter is an essential device in renewable energy source applications for generating the high synthesized levels of output voltage at required quantity even though with help of low or medium voltage DC sources. Due to running out of non-renewable sources, these Multi-Level Inverters are playing the crucial role in modern DC to AC conversion systems for making renewable energy sources as alternative for non-renewable energy sources. These Multi Level Inverter mainly facing challenging consequences of Total Harmonic Distortions, switching losses and less efficiency, and these consequences has to overcome for developing reliable Multi-Level Inverter. In this paper a 15-Level Multi-Level Inverter topology is designed with renewable energy source application. In this methodology PV with P&O MPPT technique is used to fed the 15-Level Multi-Level Inverter. Due to improvised MPPT technique and pulses to the switches will implies to get smooth output voltage with less harmonic distortions. The switching losses are also less for this topology because of less switches are used, that causes less power losses and makes high overall efficiency. The proposed methodology with 15-Level Multi-Level Inverter is designed, simulated by using MATLAB/Simulink software and compared with existing MLI topologies. The simulation results will justify that the designed Multi-Level Inverter is reliable and efficient.
{"title":"P&O MPPT Integrated PV Fed 15-Level Multi-Level Inverter","authors":"P. Prasad, C. Dhanamjayulu","doi":"10.1109/i-PACT52855.2021.9696580","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696580","url":null,"abstract":"The Multi-Level Inverter is an essential device in renewable energy source applications for generating the high synthesized levels of output voltage at required quantity even though with help of low or medium voltage DC sources. Due to running out of non-renewable sources, these Multi-Level Inverters are playing the crucial role in modern DC to AC conversion systems for making renewable energy sources as alternative for non-renewable energy sources. These Multi Level Inverter mainly facing challenging consequences of Total Harmonic Distortions, switching losses and less efficiency, and these consequences has to overcome for developing reliable Multi-Level Inverter. In this paper a 15-Level Multi-Level Inverter topology is designed with renewable energy source application. In this methodology PV with P&O MPPT technique is used to fed the 15-Level Multi-Level Inverter. Due to improvised MPPT technique and pulses to the switches will implies to get smooth output voltage with less harmonic distortions. The switching losses are also less for this topology because of less switches are used, that causes less power losses and makes high overall efficiency. The proposed methodology with 15-Level Multi-Level Inverter is designed, simulated by using MATLAB/Simulink software and compared with existing MLI topologies. The simulation results will justify that the designed Multi-Level Inverter is reliable and efficient.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"1189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.1109/i-PACT52855.2021.9696971
Naumi Krishna K Panicker, Nidhi Mittal, J. Qumar, D. Saravanan, J. Valarmathi
The Automatic Identification System (AIS) is one of the most successful maritime technologies which allows ships to autonomously communicate their positions and movements with one another, thereby playing a crucial role in collision avoidance. AIS is essentially a communication system that identifies and exchanges information such as the MMSI (Maritime Mobile Service Identities) number, navigation status, rate of turn, speed over ground, course, position, and etc with other maritime vessels and base stations. This paper aims at the development and implementation of a simulator that simulates AIS communication based on AIS standards, i.e., capturing the necessary AIS messages and displaying them on the chart plotters or live maps.
{"title":"Automatic Identification System Simulator for Marine Applications","authors":"Naumi Krishna K Panicker, Nidhi Mittal, J. Qumar, D. Saravanan, J. Valarmathi","doi":"10.1109/i-PACT52855.2021.9696971","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696971","url":null,"abstract":"The Automatic Identification System (AIS) is one of the most successful maritime technologies which allows ships to autonomously communicate their positions and movements with one another, thereby playing a crucial role in collision avoidance. AIS is essentially a communication system that identifies and exchanges information such as the MMSI (Maritime Mobile Service Identities) number, navigation status, rate of turn, speed over ground, course, position, and etc with other maritime vessels and base stations. This paper aims at the development and implementation of a simulator that simulates AIS communication based on AIS standards, i.e., capturing the necessary AIS messages and displaying them on the chart plotters or live maps.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.1109/i-PACT52855.2021.9696742
Siddarth S Menon, Rishabh Prasad, R. R. Singh
Finding alternative energy sources is critical due to rising global energy demand in a world where people are overly dependent on conventional energy sources which are very limited in quantity. The most preferred alternative energy supply is solar energy which is abundant everywhere. Solar energy can be easily captured by using PV Systems, which consists of PV cells and gives output in the form of electricity. These PV cells have a non-linear behaviour, and their power output is contingent on various factors like ambient temperature and solar irradiance. The efficient utilization of the output power from PV systems is still a big problem. To help solve this issue, techniques known as MPPT (maximum power point tracking) techniques were discovered to extract the output power of the solar PV array with high efficiency. People nowadays prefer EVs which runs on battery power because it is more cost-effective and produces low emissions when compared to the conventional internal combustion engine vehicles. And the best way to charge EVs is by using a solar PV system. In this paper, the performance of an MPPT-based solar EV battery charger is examined and compared to a standard solar EV battery charger under varying meteorological conditions.
{"title":"Performance Analysis of MPPT Integrated Solar Charger for Electric Vehicle Battery","authors":"Siddarth S Menon, Rishabh Prasad, R. R. Singh","doi":"10.1109/i-PACT52855.2021.9696742","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696742","url":null,"abstract":"Finding alternative energy sources is critical due to rising global energy demand in a world where people are overly dependent on conventional energy sources which are very limited in quantity. The most preferred alternative energy supply is solar energy which is abundant everywhere. Solar energy can be easily captured by using PV Systems, which consists of PV cells and gives output in the form of electricity. These PV cells have a non-linear behaviour, and their power output is contingent on various factors like ambient temperature and solar irradiance. The efficient utilization of the output power from PV systems is still a big problem. To help solve this issue, techniques known as MPPT (maximum power point tracking) techniques were discovered to extract the output power of the solar PV array with high efficiency. People nowadays prefer EVs which runs on battery power because it is more cost-effective and produces low emissions when compared to the conventional internal combustion engine vehicles. And the best way to charge EVs is by using a solar PV system. In this paper, the performance of an MPPT-based solar EV battery charger is examined and compared to a standard solar EV battery charger under varying meteorological conditions.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130135261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.1109/i-PACT52855.2021.9696998
S. S, Harshini Karthikeyan Aiyyer, Aditi Manthripragada
Data science has a goal to discover hidden patterns in raw data. This is exceptionally useful when discussing the stock market. The way crypto currency has taken over the world is something that wasn't predicted 20 years ago. It seems that regular market indicators aren't being implemented in the case of crypto currencies such as bit coin. Crypto currency seems to evade inflation as well. For analysts to perform analyses on these entities there are umpteen tools. One instance is the knowledge graph, which is a collection of interlinked descriptions of objects, events, or concepts. It puts data in context through linking and semantic metadata. Historical data present across many trading and finance websites enable analysts and enthusiasts to try machine learning and deep learning algorithms to predict the subsequent nature of that market. The paper has summarized and analyzed all the possible algorithms to prepare the data available regarding the lifetime and volatility of a currency state. A knowledge graph linking all the related information was also materialized along with a UML-style ontological graph is done to aid and support proper inference from the knowledge representation model.
{"title":"Cryptocurrency and Associated Bourse Analysis using Machine Learning and Knowledge Graphs","authors":"S. S, Harshini Karthikeyan Aiyyer, Aditi Manthripragada","doi":"10.1109/i-PACT52855.2021.9696998","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696998","url":null,"abstract":"Data science has a goal to discover hidden patterns in raw data. This is exceptionally useful when discussing the stock market. The way crypto currency has taken over the world is something that wasn't predicted 20 years ago. It seems that regular market indicators aren't being implemented in the case of crypto currencies such as bit coin. Crypto currency seems to evade inflation as well. For analysts to perform analyses on these entities there are umpteen tools. One instance is the knowledge graph, which is a collection of interlinked descriptions of objects, events, or concepts. It puts data in context through linking and semantic metadata. Historical data present across many trading and finance websites enable analysts and enthusiasts to try machine learning and deep learning algorithms to predict the subsequent nature of that market. The paper has summarized and analyzed all the possible algorithms to prepare the data available regarding the lifetime and volatility of a currency state. A knowledge graph linking all the related information was also materialized along with a UML-style ontological graph is done to aid and support proper inference from the knowledge representation model.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130425490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.1109/i-PACT52855.2021.9696717
S. Gowri, J. Jabez, J. R. Raj, S. Srinivasulu, Sudha
The cloud is the leading technology in the IT world for storing and managing massive quantities of data. Protection and data privacy preservation are two of the most common concerns in big data. Confidential information must be secured from multiple unauthorized accesses in attempt to optimize its security. Different traditional cryptography algorithms have been used in the security of big data in the cloud to enhance privacy. Still, because of its reduced security, there are some privacy protection concerns. With the emergence of IoT-cloud-based devices, IoT has advanced significantly in the field of big data processing. The health-care system is one of the recent IoT-based Big data applications. To preserve the privacy of patient data, several studies are required. Data security and computing overheads are still major challenges in the IoT-cloud-based health system. To ensure the privacy of huge data, the ElGamal Elliptic Curve (EGEC) encryption technique is proposed. The results are analyzed and the comparison depicts the outperformance of the proposed system.
{"title":"An Enhanced Big Data Handling Architecture for Privacy Preservation of Cloud Data","authors":"S. Gowri, J. Jabez, J. R. Raj, S. Srinivasulu, Sudha","doi":"10.1109/i-PACT52855.2021.9696717","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696717","url":null,"abstract":"The cloud is the leading technology in the IT world for storing and managing massive quantities of data. Protection and data privacy preservation are two of the most common concerns in big data. Confidential information must be secured from multiple unauthorized accesses in attempt to optimize its security. Different traditional cryptography algorithms have been used in the security of big data in the cloud to enhance privacy. Still, because of its reduced security, there are some privacy protection concerns. With the emergence of IoT-cloud-based devices, IoT has advanced significantly in the field of big data processing. The health-care system is one of the recent IoT-based Big data applications. To preserve the privacy of patient data, several studies are required. Data security and computing overheads are still major challenges in the IoT-cloud-based health system. To ensure the privacy of huge data, the ElGamal Elliptic Curve (EGEC) encryption technique is proposed. The results are analyzed and the comparison depicts the outperformance of the proposed system.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134099138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.1109/i-PACT52855.2021.9696752
S. Venkateswarlu, Divya Teja Ankireddy, N. Kumar, Rathaiah Meram, T. Prakash, Jarapala Siva Naik
Power theft is the serious unlawful methods in developing countries like India in order to avoid electricity charges. It is a major problem in every country and it must be avoided. So it is necessary to propose a system which can able to monitor the power theft and also location of theft occur. The proposed system must take required action during theft conditions. This paper describes the reliable approach to detect the power theft and to clear the fault in distribution lines. The developed control scheme require the readings of current and voltage values of house hold energy meter and transformer of distribution side. From the control design, if there is any voltage drop in load side because of power theft, the system automatically detects the power theft and locates the distance from the distribution line. So the circuit breaker got a signal from the controller simultaneously. The breaker blocks the electricity and it rechecks four times to remove the theft. In the paper, the theft is created artificially under various loads. Three different power thefts like R, RL and RLC are taken at three different tapping and percentage error is calculated from output and presented in tabular column. The proposed scheme is done in MATLAB/Simulink environment.
{"title":"Controller Design For Detection of Various Power Thefts","authors":"S. Venkateswarlu, Divya Teja Ankireddy, N. Kumar, Rathaiah Meram, T. Prakash, Jarapala Siva Naik","doi":"10.1109/i-PACT52855.2021.9696752","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696752","url":null,"abstract":"Power theft is the serious unlawful methods in developing countries like India in order to avoid electricity charges. It is a major problem in every country and it must be avoided. So it is necessary to propose a system which can able to monitor the power theft and also location of theft occur. The proposed system must take required action during theft conditions. This paper describes the reliable approach to detect the power theft and to clear the fault in distribution lines. The developed control scheme require the readings of current and voltage values of house hold energy meter and transformer of distribution side. From the control design, if there is any voltage drop in load side because of power theft, the system automatically detects the power theft and locates the distance from the distribution line. So the circuit breaker got a signal from the controller simultaneously. The breaker blocks the electricity and it rechecks four times to remove the theft. In the paper, the theft is created artificially under various loads. Three different power thefts like R, RL and RLC are taken at three different tapping and percentage error is calculated from output and presented in tabular column. The proposed scheme is done in MATLAB/Simulink environment.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134304214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.1109/i-PACT52855.2021.9696715
Unnikrishnan Menon, A. Menon, Atharva Hudlikar, A. Sharmila, P. Mahalakshmi
With the advent of modern computing technologies, there is a wide scope for introduction of advanced and highly secure encryption standards that cannot be rendered obsolete even when subjected to these techniques. This paper introduces one such encryption paradigm, implemented using autoencoders. The proposed algorithm trains an autoencoder to replicate an input 8-bit ASCII value and takes advantage of the bottle-neck architecture to encrypt the data in a way that can only be retrieved using the trained weights. Various analyses are utilized to exemplify the speed as well as security of the proposed cryptosystem.
{"title":"A Hybrid Autoencoder Architecture for Text Encryption","authors":"Unnikrishnan Menon, A. Menon, Atharva Hudlikar, A. Sharmila, P. Mahalakshmi","doi":"10.1109/i-PACT52855.2021.9696715","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696715","url":null,"abstract":"With the advent of modern computing technologies, there is a wide scope for introduction of advanced and highly secure encryption standards that cannot be rendered obsolete even when subjected to these techniques. This paper introduces one such encryption paradigm, implemented using autoencoders. The proposed algorithm trains an autoencoder to replicate an input 8-bit ASCII value and takes advantage of the bottle-neck architecture to encrypt the data in a way that can only be retrieved using the trained weights. Various analyses are utilized to exemplify the speed as well as security of the proposed cryptosystem.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130980561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.1109/i-PACT52855.2021.9696803
Saslina Kamaruddin, Wan Rosalili Wan Rosli, Nadia Nabila Mohd Saufi, Ani Munirah Mohammad, Z. Hamin
Artificial Intelligence (AI) is increasingly taking hold throughout worldwide businesses. Since 2017, anticipated AI usage in Malaysia has increased by 32 percent due to innovative city projects and public safety and intelligent transportation applications. However, such AI development is afflicted by privacy and data breaches as the existing data protection regulation safeguards against unlawful commercial use of personal data. Recent developments reflect the failure of present legal mechanisms to address such infringements and effective data management and protection deficiencies. This study examines the legal concerns of privacy and data protection and problems associated with the use of AI in Malaysia. This research adopts a methodology of doctrinal research, a systematic method of legal reasoning, including analyzing primary and secondary resources. The findings imply that AI evolves, magnifying the ability to use personal information that may affect privacy. Thus, infringement of privacy and use of personal data without legal oversight or effective governance could result in privacy deprivation and abuse of personal data that might be used to perpetrate crimes
{"title":"The Quandary in Data Protection and Rights to Privacy of AI Technology Adoption in Malaysia","authors":"Saslina Kamaruddin, Wan Rosalili Wan Rosli, Nadia Nabila Mohd Saufi, Ani Munirah Mohammad, Z. Hamin","doi":"10.1109/i-PACT52855.2021.9696803","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696803","url":null,"abstract":"Artificial Intelligence (AI) is increasingly taking hold throughout worldwide businesses. Since 2017, anticipated AI usage in Malaysia has increased by 32 percent due to innovative city projects and public safety and intelligent transportation applications. However, such AI development is afflicted by privacy and data breaches as the existing data protection regulation safeguards against unlawful commercial use of personal data. Recent developments reflect the failure of present legal mechanisms to address such infringements and effective data management and protection deficiencies. This study examines the legal concerns of privacy and data protection and problems associated with the use of AI in Malaysia. This research adopts a methodology of doctrinal research, a systematic method of legal reasoning, including analyzing primary and secondary resources. The findings imply that AI evolves, magnifying the ability to use personal information that may affect privacy. Thus, infringement of privacy and use of personal data without legal oversight or effective governance could result in privacy deprivation and abuse of personal data that might be used to perpetrate crimes","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131259127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-27DOI: 10.1109/i-PACT52855.2021.9696632
K. A. Swamy, Z. C. Alex, Prakash Ramachandran, T. L. Mathew, C. Sushma, N. Padmaja
In the case of sensorineural hearing loss, the hearing aid needs to amplify the audio signal selectively based and frequency and very sensitively based on the hearing threshold. In this paper, we proposed to implement a new 16-point Discrete Cosine Transform (DCT) base delay efficient algorithm for hearing aid applications. This proposed algorithm gives better matching error with smaller delay due to uniform resampling and recursive modification of hearing thresholds in an audiogram. Delay and matching error are the main parameters in analysing the performance of the hearing aid algorithm. Four audiograms with various degrees of hearing loss are used to test the suggested method. When compared to filter bank approaches, the suggested algorithm has a lower matching error and a faster response time. The proposed algorithm is implemented on a TMS320C5505 DSP processor to validate the simulation results.
{"title":"Real-time Implementation of Delay Efficient DCT Based Hearing Aid Algorithm Using TMS320C5505 DSP Processor","authors":"K. A. Swamy, Z. C. Alex, Prakash Ramachandran, T. L. Mathew, C. Sushma, N. Padmaja","doi":"10.1109/i-PACT52855.2021.9696632","DOIUrl":"https://doi.org/10.1109/i-PACT52855.2021.9696632","url":null,"abstract":"In the case of sensorineural hearing loss, the hearing aid needs to amplify the audio signal selectively based and frequency and very sensitively based on the hearing threshold. In this paper, we proposed to implement a new 16-point Discrete Cosine Transform (DCT) base delay efficient algorithm for hearing aid applications. This proposed algorithm gives better matching error with smaller delay due to uniform resampling and recursive modification of hearing thresholds in an audiogram. Delay and matching error are the main parameters in analysing the performance of the hearing aid algorithm. Four audiograms with various degrees of hearing loss are used to test the suggested method. When compared to filter bank approaches, the suggested algorithm has a lower matching error and a faster response time. The proposed algorithm is implemented on a TMS320C5505 DSP processor to validate the simulation results.","PeriodicalId":335956,"journal":{"name":"2021 Innovations in Power and Advanced Computing Technologies (i-PACT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}