首页 > 最新文献

2023 Second International Conference on Electronics and Renewable Systems (ICEARS)最新文献

英文 中文
Portable Automatic System for Locating Victims of Plane Crashes 定位飞机失事遇难者的便携式自动系统
Pub Date : 2023-03-02 DOI: 10.1109/ICEARS56392.2023.10085070
C. Ciufudean, C. Buzduga
The response time of the authorities in case of a plane crash is essential for lifesaving. The system presented in this paper with the acronym "AS Locating", it is an ultraportable system which has the role of locating in real time the victims of plane crashes. AS Locating system comes into operation automatically after certain values received from various sensors exceed certain threshold preset values, such as acceleration, velocity, air pressure, mechanical chocks, and pulse. Further development of AS Locating system is also presented.
当局在飞机失事时的反应时间对于挽救生命至关重要。本文提出的系统简称为“AS定位”,是一种具有飞机失事遇难者实时定位功能的超便携系统。当从各种传感器接收到的某些值超过一定的阈值预设值(如加速度、速度、气压、机械挡块和脉冲)后,AS定位系统自动进入工作状态。并对AS定位系统的进一步发展进行了展望。
{"title":"Portable Automatic System for Locating Victims of Plane Crashes","authors":"C. Ciufudean, C. Buzduga","doi":"10.1109/ICEARS56392.2023.10085070","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085070","url":null,"abstract":"The response time of the authorities in case of a plane crash is essential for lifesaving. The system presented in this paper with the acronym \"AS Locating\", it is an ultraportable system which has the role of locating in real time the victims of plane crashes. AS Locating system comes into operation automatically after certain values received from various sensors exceed certain threshold preset values, such as acceleration, velocity, air pressure, mechanical chocks, and pulse. Further development of AS Locating system is also presented.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":" 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113950600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Support Vector based classification for Adaptive Channel Equalization 基于支持向量的自适应信道均衡分类
Pub Date : 2023-03-02 DOI: 10.1109/ICEARS56392.2023.10085218
D. Diana, R. Hema, G. N. Kumar, R. Rohith Kumar
Support vector machine, a newly developed machine learning technology, is suggested as a tool for carrying out nonlinear equalization in communication networks. Support vector machine has the benefit of allowing the discovery of fewer model parameters while requiring less previous information and heuristic assumptions than some earlier systems. A support vector machine's optimization process also uses quadratic programming, a well-researched and well-understood mathematical programming paradigm.On nonlinear topics that have already been researched by other researchers utilizing neural networks, support vector machine simulations are run. This makes it possible to compare the suggested approach for nonlinear detection first to other methods in order to assess its viability. Results demonstrate that support vector machines outperform neural networks on the nonlinear issues studied.
支持向量机是一种新兴的机器学习技术,被认为是实现通信网络非线性均衡的工具。支持向量机的优点是允许发现更少的模型参数,同时比一些早期的系统需要更少的先前信息和启发式假设。支持向量机的优化过程也使用二次规划,这是一种经过充分研究和理解的数学规划范式。对于其他研究者已经利用神经网络研究过的非线性问题,进行了支持向量机模拟。这使得可以比较建议的非线性检测方法首先与其他方法,以评估其可行性。结果表明,支持向量机在非线性问题上优于神经网络。
{"title":"Support Vector based classification for Adaptive Channel Equalization","authors":"D. Diana, R. Hema, G. N. Kumar, R. Rohith Kumar","doi":"10.1109/ICEARS56392.2023.10085218","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085218","url":null,"abstract":"Support vector machine, a newly developed machine learning technology, is suggested as a tool for carrying out nonlinear equalization in communication networks. Support vector machine has the benefit of allowing the discovery of fewer model parameters while requiring less previous information and heuristic assumptions than some earlier systems. A support vector machine's optimization process also uses quadratic programming, a well-researched and well-understood mathematical programming paradigm.On nonlinear topics that have already been researched by other researchers utilizing neural networks, support vector machine simulations are run. This makes it possible to compare the suggested approach for nonlinear detection first to other methods in order to assess its viability. Results demonstrate that support vector machines outperform neural networks on the nonlinear issues studied.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122254608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Review of Haptic Gloves: Advances, Challenges, and Future Directions 触觉手套的综合综述:进展、挑战和未来方向
Pub Date : 2023-03-02 DOI: 10.1109/ICEARS56392.2023.10085607
Shanmugam M, Kanagaraj Venusamy, S. S., Srivatsan S, Naresh Kumar O
The sense of touch and feel is an important asset to the human beings in all aspects across a variety of fields. For a long time, it has been almost impossible to mimic the sense of touch i.e. the natural feedback. Devices that had been developed have been based around piezo electric, Hall Effect sensors, and a combination of sensors and actuators to sense and replicate the feedback. To a certain extent, they have laid the foundation for the field of haptics. Haptics initially were limited to the vibrotactile responses, which were the ones commonly seen in the modern smartphone. Further research and development has led to it being closer than ever to mimic the sense of touch. Several devices were created by incorporating the field of haptics with existing design and devices. One such device is the Haptic glove. A haptic glove is a cutting-edge technology that allows human operators to physically feel the sensation of touch and force feedback when remotely controlling robots or other devices. These gloves are designed to mimic the sense of touch, allowing the operator to feel the shape, texture, and rigidity of the object they are manipulating through the robot. The use of haptic gloves in robotic teleoperation has been found to improve the precision and accuracy of remote tasks, as well as reducing the cognitive load on the operator. This technology can be adopted in field such as manufacturing, surgery, and space exploration. For example, in manufacturing, haptic gloves can be used to remotely operate machinery or perform inspections on hard-to-reach areas, while in surgery; haptic gloves can enable surgeons to perform remote surgeries with greater precision and control. In space exploration, haptic gloves can be used to remotely control robots for tasks such as sample collection and maintenance. Future developments in haptic technology could lead to even more advanced and realistic haptic feedback, further enhancing the capabilities of robotic teleoperation.
触觉和感觉是人类在各个领域的重要资产。很长一段时间以来,模仿触觉(即自然反馈)几乎是不可能的。已经开发的设备是基于压电,霍尔效应传感器,以及传感器和执行器的组合来感知和复制反馈。在一定程度上,他们为触觉领域奠定了基础。触觉最初仅限于振动触觉反应,这是现代智能手机中常见的反应。进一步的研究和发展使它比以往任何时候都更接近于模仿触觉。通过将触觉领域与现有设计和设备相结合,创造了几种设备。触觉手套就是这样一种设备。触觉手套是一项尖端技术,可以让人类操作员在远程控制机器人或其他设备时感受到触摸和力反馈的感觉。这些手套是为了模仿触觉而设计的,允许操作员通过机器人感受到他们正在操纵的物体的形状、质地和硬度。在机器人远程操作中使用触觉手套可以提高远程任务的精度和准确性,并减少操作者的认知负荷。该技术可应用于制造业、外科手术、太空探索等领域。例如,在制造业中,触觉手套可用于远程操作机械或在手术中对难以到达的区域进行检查;触觉手套可以使外科医生以更高的精度和控制进行远程手术。在太空探索中,触觉手套可用于远程控制机器人执行诸如样品收集和维护之类的任务。触觉技术的未来发展可能会导致更先进和真实的触觉反馈,进一步提高机器人的远程操作能力。
{"title":"A Comprehensive Review of Haptic Gloves: Advances, Challenges, and Future Directions","authors":"Shanmugam M, Kanagaraj Venusamy, S. S., Srivatsan S, Naresh Kumar O","doi":"10.1109/ICEARS56392.2023.10085607","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085607","url":null,"abstract":"The sense of touch and feel is an important asset to the human beings in all aspects across a variety of fields. For a long time, it has been almost impossible to mimic the sense of touch i.e. the natural feedback. Devices that had been developed have been based around piezo electric, Hall Effect sensors, and a combination of sensors and actuators to sense and replicate the feedback. To a certain extent, they have laid the foundation for the field of haptics. Haptics initially were limited to the vibrotactile responses, which were the ones commonly seen in the modern smartphone. Further research and development has led to it being closer than ever to mimic the sense of touch. Several devices were created by incorporating the field of haptics with existing design and devices. One such device is the Haptic glove. A haptic glove is a cutting-edge technology that allows human operators to physically feel the sensation of touch and force feedback when remotely controlling robots or other devices. These gloves are designed to mimic the sense of touch, allowing the operator to feel the shape, texture, and rigidity of the object they are manipulating through the robot. The use of haptic gloves in robotic teleoperation has been found to improve the precision and accuracy of remote tasks, as well as reducing the cognitive load on the operator. This technology can be adopted in field such as manufacturing, surgery, and space exploration. For example, in manufacturing, haptic gloves can be used to remotely operate machinery or perform inspections on hard-to-reach areas, while in surgery; haptic gloves can enable surgeons to perform remote surgeries with greater precision and control. In space exploration, haptic gloves can be used to remotely control robots for tasks such as sample collection and maintenance. Future developments in haptic technology could lead to even more advanced and realistic haptic feedback, further enhancing the capabilities of robotic teleoperation.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123638325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Systematic Review on Humanizing Machine Intelligence and Artificial Intelligence 人性化机器智能与人工智能系统综述
Pub Date : 2023-03-02 DOI: 10.1109/ICEARS56392.2023.10084967
Juby Abraham, George Joseph Cherian, N. Jayapandian
In this era, Machine Learning is transforming human lives in a very different way. The need to give machines the power to make decisions or giving the moral compass is a big dilemma when humanity is more divided than it has ever been. There are two main ways in which law and AI interact. AI may be subject to legal restrictions and be employed in courtroom procedures. The world around us is being significantly and swiftly changed by AI in all of its manifestations. Public law includes important facets such as nondiscrimination law and labor law. In a manner similar to this when artificial intelligence (AI) is applied to tangible technology like robots. In certain cases, artificial intelligence (AI) might be hardly noticeable to customers but evident to those who built and are using it. The behavior research offers suggestions for how to build enduring and beneficial interactions between intelligent robots and people. The human improvement is main obstacles in the development and implementation of artificial intelligence. Best practices in this area are not governed by any one strategy that is generally acknowledged. Machine learning is about to revolutionize society as it is know it. It is crucial to give intelligent computers a moral compass now more than ever before because of how divided mankind is. Although machine learning has limitless potential, inappropriate usage might have detrimental long-term implications. It will think about how, for instance, earlier cultures built trust and improved social interactions via creative answers to many of the ethical issues that machine learning is posing now.
在这个时代,机器学习正在以一种非常不同的方式改变着人类的生活。在人类比以往任何时候都更加分裂的情况下,是需要赋予机器做决定的能力,还是需要赋予道德指南针,这是一个巨大的难题。法律和人工智能的互动主要有两种方式。人工智能可能受到法律限制,并可用于法庭程序。我们周围的世界正因人工智能的各种表现形式而发生重大而迅速的变化。公法包括非歧视法和劳动法等重要方面。这与人工智能(AI)应用于机器人等有形技术的方式类似。在某些情况下,人工智能(AI)可能很难被客户注意到,但对那些构建和使用它的人来说却是显而易见的。行为研究为如何在智能机器人和人之间建立持久和有益的互动提供了建议。人类的进步是人工智能发展和实施的主要障碍。这一领域的最佳实践不受任何一种普遍认可的策略的支配。正如我们所知,机器学习即将彻底改变社会。现在比以往任何时候都更有必要给智能计算机一个道德指南针,因为人类是多么的分裂。尽管机器学习具有无限的潜力,但不当使用可能会产生有害的长期影响。例如,它将思考早期文化如何通过创造性地回答机器学习现在提出的许多道德问题来建立信任和改善社会互动。
{"title":"Systematic Review on Humanizing Machine Intelligence and Artificial Intelligence","authors":"Juby Abraham, George Joseph Cherian, N. Jayapandian","doi":"10.1109/ICEARS56392.2023.10084967","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10084967","url":null,"abstract":"In this era, Machine Learning is transforming human lives in a very different way. The need to give machines the power to make decisions or giving the moral compass is a big dilemma when humanity is more divided than it has ever been. There are two main ways in which law and AI interact. AI may be subject to legal restrictions and be employed in courtroom procedures. The world around us is being significantly and swiftly changed by AI in all of its manifestations. Public law includes important facets such as nondiscrimination law and labor law. In a manner similar to this when artificial intelligence (AI) is applied to tangible technology like robots. In certain cases, artificial intelligence (AI) might be hardly noticeable to customers but evident to those who built and are using it. The behavior research offers suggestions for how to build enduring and beneficial interactions between intelligent robots and people. The human improvement is main obstacles in the development and implementation of artificial intelligence. Best practices in this area are not governed by any one strategy that is generally acknowledged. Machine learning is about to revolutionize society as it is know it. It is crucial to give intelligent computers a moral compass now more than ever before because of how divided mankind is. Although machine learning has limitless potential, inappropriate usage might have detrimental long-term implications. It will think about how, for instance, earlier cultures built trust and improved social interactions via creative answers to many of the ethical issues that machine learning is posing now.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126913665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Prediction of Brain Stroke in Human Beings using Machine Learning 利用机器学习预测人类脑中风
Pub Date : 2023-03-02 DOI: 10.1109/ICEARS56392.2023.10085128
T. N. Deepthi, S. Sharmila, M. Swarna, M. Gouthami, C. Akshaya
Blood vessels in brain serve a major function in supplying the brain with nutrients and oxygen. All body parts are meant to be worked out actively. One of the deadliest diseases in the world is a brain stroke. Most strokes fall within the ischemic embolic and haemorrhagic categories. A blood clot that originates away from the patient's brain, typically in the heart, travels through the patient's bloodstream to lodge in the brain's smaller arteries to cause an ischemic stroke. The second is haemorrhagic stroke occurs when a brain artery bursts or releases blood. When a blood vessel either bursts or becomes blocked by a clot, a stroke develops. This study has collected a variety of patients' datasets. It includes a number of medical factors. There are a variety of machine learning algorithms available for making predictions, here the K-Nearest Neighbour with Random Forest algorithms are considered.
大脑中的血管在为大脑提供营养和氧气方面起着重要的作用。身体的所有部位都应该积极锻炼。脑中风是世界上最致命的疾病之一。大多数中风属于缺血性栓塞和出血性类别。从患者的大脑中产生的血块,通常在心脏中,通过患者的血液进入大脑的小动脉,导致缺血性中风。第二种是出血性中风,当脑动脉破裂或释放血液时发生。当血管破裂或被血栓阻塞时,就会发生中风。这项研究收集了各种患者的数据集。它包括一些医疗因素。有各种各样的机器学习算法可用于进行预测,这里考虑了随机森林算法的k近邻。
{"title":"Prediction of Brain Stroke in Human Beings using Machine Learning","authors":"T. N. Deepthi, S. Sharmila, M. Swarna, M. Gouthami, C. Akshaya","doi":"10.1109/ICEARS56392.2023.10085128","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085128","url":null,"abstract":"Blood vessels in brain serve a major function in supplying the brain with nutrients and oxygen. All body parts are meant to be worked out actively. One of the deadliest diseases in the world is a brain stroke. Most strokes fall within the ischemic embolic and haemorrhagic categories. A blood clot that originates away from the patient's brain, typically in the heart, travels through the patient's bloodstream to lodge in the brain's smaller arteries to cause an ischemic stroke. The second is haemorrhagic stroke occurs when a brain artery bursts or releases blood. When a blood vessel either bursts or becomes blocked by a clot, a stroke develops. This study has collected a variety of patients' datasets. It includes a number of medical factors. There are a variety of machine learning algorithms available for making predictions, here the K-Nearest Neighbour with Random Forest algorithms are considered.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132951239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Analytical Approach to Fraudulent Credit Card Transaction Detection using Various Machine Learning Algorithms 使用各种机器学习算法的信用卡欺诈交易检测分析方法
Pub Date : 2023-03-02 DOI: 10.1109/ICEARS56392.2023.10085157
Yuhes Raajha. M. R, K. A, Rajkumar. D, R. Reshma, Dr. R. Santhosh, N. Mekala
Technology and the revolution in communication have increased the popularity of digital money usage. Most of the monetary transactions currently take place digitally. It is more convenient and increases the ease for the user. But one major problem in digital money and credit card usage is security. With the increase in credit card usage, security issues increase correspondingly. Many studies and research work are going on to avoid and prevent such practices from taking place. Moreover, various studies on real-international credit scorecard statistics are attributable to confidentiality issues. This paper focuses on current credit card fraud practices and fraud detection methods implemented in real time. Different ML algorithms like fuzzy-based SVM (FSVM), random forest (RF), logistic regression (LR), and support vector machine (SVM) for fraudulent transaction detection on the dataset collected from credit card users have been used to classify legitimate and fraudulent transactions. The comparative analysis of the credit card fraud detection scheme using these classification models was performed with precision, accuracy, sensitivity, and specificity. The comparative analysis outcomes showed that the highest performance was given by the FS VM over other algorithms with an accuracy of 98.61%.
技术和通信革命增加了数字货币使用的普及程度。目前大多数货币交易都是数字化的。它更方便,增加了用户的易用性。但数字货币和信用卡使用的一个主要问题是安全性。随着信用卡使用量的增加,安全问题也相应增加。许多研究和研究工作正在进行,以避免和防止这种做法的发生。此外,对真实国际信用记分卡统计数据的各种研究都是由于保密问题。本文重点介绍了当前信用卡欺诈行为和实时实施的欺诈检测方法。不同的机器学习算法,如基于模糊的支持向量机(FSVM)、随机森林(RF)、逻辑回归(LR)和支持向量机(SVM),用于从信用卡用户收集的数据集上进行欺诈交易检测,已被用于对合法和欺诈交易进行分类。利用这些分类模型对信用卡欺诈检测方案进行了精密度、准确度、灵敏度和特异性的比较分析。对比分析结果表明,FS VM比其他算法具有最高的性能,准确率为98.61%。
{"title":"An Analytical Approach to Fraudulent Credit Card Transaction Detection using Various Machine Learning Algorithms","authors":"Yuhes Raajha. M. R, K. A, Rajkumar. D, R. Reshma, Dr. R. Santhosh, N. Mekala","doi":"10.1109/ICEARS56392.2023.10085157","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085157","url":null,"abstract":"Technology and the revolution in communication have increased the popularity of digital money usage. Most of the monetary transactions currently take place digitally. It is more convenient and increases the ease for the user. But one major problem in digital money and credit card usage is security. With the increase in credit card usage, security issues increase correspondingly. Many studies and research work are going on to avoid and prevent such practices from taking place. Moreover, various studies on real-international credit scorecard statistics are attributable to confidentiality issues. This paper focuses on current credit card fraud practices and fraud detection methods implemented in real time. Different ML algorithms like fuzzy-based SVM (FSVM), random forest (RF), logistic regression (LR), and support vector machine (SVM) for fraudulent transaction detection on the dataset collected from credit card users have been used to classify legitimate and fraudulent transactions. The comparative analysis of the credit card fraud detection scheme using these classification models was performed with precision, accuracy, sensitivity, and specificity. The comparative analysis outcomes showed that the highest performance was given by the FS VM over other algorithms with an accuracy of 98.61%.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effective Management of IoT Devices that can Withstand Attacks on Cloud Data 有效管理可抵御云数据攻击的物联网设备
Pub Date : 2023-03-02 DOI: 10.1109/ICEARS56392.2023.10085408
A. M, Thirumalai A
First, with regards to attribute-based encryption (ABE), it is an approach to access control that allows data to be encrypted and decrypted based on certain attributes, such as a user's role, location, or other characteristics. This approach provides granular control over who can access specific data, which is particularly useful for IoT applications where sensitive data is being generated by many devices. However, as I mentioned earlier, ABE can be computationally intensive, which may not be suitable for low-power IoT devices. One possible solution to this challenge is to use edge computing, where some of the computing tasks are performed at the edge of the network, closer to the devices generating the data. This can help reduce the amount of data that needs to be sent to the cloud and can improve overall system performance. Another challenge with ABE is that it does not provide protection against key sharing. If a user shares their decryption key with an unauthorized party, that party could potentially gain access to sensitive data. To address this challenge, it's important to have strong access controls in place to prevent unauthorized sharing of keys. In terms of data storage security, while outsourcing to cloud servers can certainly help with complex computing tasks, it's still important to implement sophisticated security measures. This might include encrypting the data at rest and in transit, implementing access controls, and monitoring the system for potential security breaches. Finally, it's important to follow regulations and best practices for key sharing to prevent unauthorized access to sensitive data. This might include policies around key management, user authentication, and data governance.
首先,关于基于属性的加密(ABE),它是一种访问控制方法,允许根据某些属性(例如用户的角色、位置或其他特征)对数据进行加密和解密。这种方法提供了对谁可以访问特定数据的细粒度控制,这对于由许多设备生成敏感数据的物联网应用程序特别有用。然而,正如我前面提到的,ABE可能是计算密集型的,这可能不适合低功耗物联网设备。应对这一挑战的一个可能的解决方案是使用边缘计算,其中一些计算任务在网络边缘执行,更靠近生成数据的设备。这有助于减少需要发送到云的数据量,并可以提高整体系统性能。ABE的另一个挑战是它不提供防止密钥共享的保护。如果用户与未授权方共享其解密密钥,则该方可能获得对敏感数据的访问权限。为了应对这一挑战,重要的是要有强大的访问控制,以防止未经授权的密钥共享。就数据存储安全性而言,虽然外包给云服务器当然可以帮助处理复杂的计算任务,但实现复杂的安全措施仍然很重要。这可能包括对静态和传输中的数据进行加密,实现访问控制,以及监视系统是否存在潜在的安全漏洞。最后,必须遵循密钥共享的法规和最佳实践,以防止对敏感数据的未经授权访问。这可能包括围绕密钥管理、用户身份验证和数据治理的策略。
{"title":"Effective Management of IoT Devices that can Withstand Attacks on Cloud Data","authors":"A. M, Thirumalai A","doi":"10.1109/ICEARS56392.2023.10085408","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085408","url":null,"abstract":"First, with regards to attribute-based encryption (ABE), it is an approach to access control that allows data to be encrypted and decrypted based on certain attributes, such as a user's role, location, or other characteristics. This approach provides granular control over who can access specific data, which is particularly useful for IoT applications where sensitive data is being generated by many devices. However, as I mentioned earlier, ABE can be computationally intensive, which may not be suitable for low-power IoT devices. One possible solution to this challenge is to use edge computing, where some of the computing tasks are performed at the edge of the network, closer to the devices generating the data. This can help reduce the amount of data that needs to be sent to the cloud and can improve overall system performance. Another challenge with ABE is that it does not provide protection against key sharing. If a user shares their decryption key with an unauthorized party, that party could potentially gain access to sensitive data. To address this challenge, it's important to have strong access controls in place to prevent unauthorized sharing of keys. In terms of data storage security, while outsourcing to cloud servers can certainly help with complex computing tasks, it's still important to implement sophisticated security measures. This might include encrypting the data at rest and in transit, implementing access controls, and monitoring the system for potential security breaches. Finally, it's important to follow regulations and best practices for key sharing to prevent unauthorized access to sensitive data. This might include policies around key management, user authentication, and data governance.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Conveyor Belt System enabled with IoT in Postal and Courier Services 邮政和快递服务中物联网输送带系统的研究
Pub Date : 2023-03-02 DOI: 10.1109/ICEARS56392.2023.10085155
Kanagaraj Venusamy, Abdul Hafeel M, K. M, Muthukkaruppan S, Chandramohan P
The limitation in the procedure of India’s postal service is that it takes additional operations and human work, making it harder and impossible to reduce costs and time. Weighing, sorting, and updating information are the laborious processes which could be more productive and cheaper when automated. A barcode scanner-based courier sorting system conveyor belt design using IoT has been proposed in this paper. Barcode scanning, weight estimation, and product tracking utilizing an IoT-powered conveyor system are the key goals of this work. This allows postal service systems to combine contemporary technology for logistics monitoring, sorting by destination and weight, shipping cost estimates, and quick information access.
印度邮政服务程序的局限性在于,它需要额外的操作和人力,这使得降低成本和时间变得更加困难和不可能。称重、分类和更新信息都是费力的过程,如果自动化的话,这些过程可能会更高效、更便宜。提出了一种基于条码扫描器的快递分拣系统传送带的物联网设计。条形码扫描、重量估计和利用物联网驱动的输送系统进行产品跟踪是这项工作的关键目标。这使得邮政服务系统能够结合现代技术进行物流监控、按目的地和重量分拣、运输成本估算和快速信息获取。
{"title":"Study on Conveyor Belt System enabled with IoT in Postal and Courier Services","authors":"Kanagaraj Venusamy, Abdul Hafeel M, K. M, Muthukkaruppan S, Chandramohan P","doi":"10.1109/ICEARS56392.2023.10085155","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085155","url":null,"abstract":"The limitation in the procedure of India’s postal service is that it takes additional operations and human work, making it harder and impossible to reduce costs and time. Weighing, sorting, and updating information are the laborious processes which could be more productive and cheaper when automated. A barcode scanner-based courier sorting system conveyor belt design using IoT has been proposed in this paper. Barcode scanning, weight estimation, and product tracking utilizing an IoT-powered conveyor system are the key goals of this work. This allows postal service systems to combine contemporary technology for logistics monitoring, sorting by destination and weight, shipping cost estimates, and quick information access.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121302823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cotton Leaf Disease Detection using Convolutional Neural Networks (CNN) 卷积神经网络(CNN)棉花叶病检测
Pub Date : 2023-03-02 DOI: 10.1109/ICEARS56392.2023.10085551
S. Sharmila, R. Bhargavi, R. Anusha, K. Anusha, B. Divya
Deep learning is a subset of artificial intelligence. It's a form of artificial intelligence and machine learning that attempts to simulate the way humans pick up specific types of information. The goal of this project is to create a deep learning model based on convolutional neural networks that can distinguish between healthy and diseased leaves. Due to its useful features in learner autonomy and extraction of features, it has drawn a great deal of attention in past years from researchers and industry professionals alike. Images of healthy and rotting leaves are included in the dataset. It is widely used in fields such as computational linguistics, voice processing, image processing, and video processing. It has also become a center for studies on agricultural plant protection, such as the detection of plant diseases and the assessment of pest ranges. This study has also discussed about some of the problems and issues that are currently being faced and need to be addressed. Library packages such as KERAS, MATPLOTLIB, NUMPY, and OPENCV have been utilized here.
深度学习是人工智能的一个子集。它是人工智能和机器学习的一种形式,试图模拟人类获取特定类型信息的方式。这个项目的目标是创建一个基于卷积神经网络的深度学习模型,可以区分健康和患病的叶子。由于其在学习者自主和特征提取方面的有用特性,近年来引起了研究人员和业内人士的广泛关注。数据集中包括健康和腐烂叶子的图像。它被广泛应用于计算语言学、语音处理、图像处理和视频处理等领域。它还成为农业植物保护研究中心,如植物病害检测和害虫范围评估。本研究还讨论了目前面临和需要解决的一些问题和问题。这里使用了KERAS、MATPLOTLIB、NUMPY和OPENCV等库包。
{"title":"Cotton Leaf Disease Detection using Convolutional Neural Networks (CNN)","authors":"S. Sharmila, R. Bhargavi, R. Anusha, K. Anusha, B. Divya","doi":"10.1109/ICEARS56392.2023.10085551","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085551","url":null,"abstract":"Deep learning is a subset of artificial intelligence. It's a form of artificial intelligence and machine learning that attempts to simulate the way humans pick up specific types of information. The goal of this project is to create a deep learning model based on convolutional neural networks that can distinguish between healthy and diseased leaves. Due to its useful features in learner autonomy and extraction of features, it has drawn a great deal of attention in past years from researchers and industry professionals alike. Images of healthy and rotting leaves are included in the dataset. It is widely used in fields such as computational linguistics, voice processing, image processing, and video processing. It has also become a center for studies on agricultural plant protection, such as the detection of plant diseases and the assessment of pest ranges. This study has also discussed about some of the problems and issues that are currently being faced and need to be addressed. Library packages such as KERAS, MATPLOTLIB, NUMPY, and OPENCV have been utilized here.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121347911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction of Diabetic Patients with High Risk of Readmission using Smart Decision Support Framework 应用智能决策支持框架预测糖尿病高危再入院患者
Pub Date : 2023-03-02 DOI: 10.1109/ICEARS56392.2023.10085491
N. Kumar, N. Sathyanarayana
Patients with diabetes are more likely to be readmitted to the hospital than those who are nondiabetic. The earlier patients with a strong probability of readmission are monitored and cared for, the better. The goal of this research is to develop a decision - making framework that can identify diabetes patients who are at risk of early readmission. Many data analysis approaches have been employed to perform this. Computer vision is used to create a novel model in this study. Individuals at high risk of complications to be readmitted are prioritized in the early stages, which in turn reduces healthcare costs and improves the reputation of the hospital, thus enhancing the health service and saving money. Predictions made using machine learning are more accurate than those made using traditional methods. In this study, patients' hospital readmissions may be predicted by utilizing a standard scaler, a decision tree, and random forests for classification, CATboost for categorical features, and XGBoost classifiers. When applied to real-world data, a machine learning method that incorporates deep learning technique has outperformed the other methods. As a response to a number of modules, including extracting features, the analysis has been enhanced and a more useful framework has been created.
糖尿病患者比非糖尿病患者更容易再次入院。再入院可能性较大的患者越早得到监测和照顾越好。本研究的目的是建立一个决策框架,可以识别早期再入院风险的糖尿病患者。许多数据分析方法已被用于执行此操作。本研究利用计算机视觉技术建立了一种新的模型。在早期阶段优先考虑需要再次入院的高危并发症患者,从而降低医疗费用,提高医院的声誉,从而提高医疗服务水平并节省资金。使用机器学习做出的预测比使用传统方法做出的预测更准确。在本研究中,可以通过使用标准标量、决策树和随机森林分类、CATboost分类特征和XGBoost分类器来预测患者的再入院情况。当应用于实际数据时,结合深度学习技术的机器学习方法优于其他方法。作为对许多模块(包括提取特征)的响应,分析得到了增强,并创建了一个更有用的框架。
{"title":"Prediction of Diabetic Patients with High Risk of Readmission using Smart Decision Support Framework","authors":"N. Kumar, N. Sathyanarayana","doi":"10.1109/ICEARS56392.2023.10085491","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085491","url":null,"abstract":"Patients with diabetes are more likely to be readmitted to the hospital than those who are nondiabetic. The earlier patients with a strong probability of readmission are monitored and cared for, the better. The goal of this research is to develop a decision - making framework that can identify diabetes patients who are at risk of early readmission. Many data analysis approaches have been employed to perform this. Computer vision is used to create a novel model in this study. Individuals at high risk of complications to be readmitted are prioritized in the early stages, which in turn reduces healthcare costs and improves the reputation of the hospital, thus enhancing the health service and saving money. Predictions made using machine learning are more accurate than those made using traditional methods. In this study, patients' hospital readmissions may be predicted by utilizing a standard scaler, a decision tree, and random forests for classification, CATboost for categorical features, and XGBoost classifiers. When applied to real-world data, a machine learning method that incorporates deep learning technique has outperformed the other methods. As a response to a number of modules, including extracting features, the analysis has been enhanced and a more useful framework has been created.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121428801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 Second International Conference on Electronics and Renewable Systems (ICEARS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1