Pub Date : 2022-12-10DOI: 10.1109/STCR55312.2022.10009327
K. Vilohit, B. N, H. Rajaguru
A recent analysis found that ductal carcinoma, another name for breast cancer, is increasingly prevalent in women any time after puberty. Their brain, bones, liver, lungs, and other organs might acquire cancer as a result of their negligence during that particular time period. Hence to diagnose the breast cancer, the Decision Tree classifier can be implemented on the gene expression data. To enhance the results provided by decision tree classifier, the Elephant Herding Optimization will be used to transform the input gene expression data in this work. Principal Component Analysis is utilized for decreasing the dimensionality of gene expression data since the dimensionality of original dataset is very huge. The experiment is carried out on the dataset downloaded from the CuMiDa website. Through experiments it is found that, transform based on Elephant Herding Optimization helps the decision tree classifier for providing improved performance.
{"title":"Improvisation of Decision Tree Classification Performance in Breast Cancer Diagnosis using Elephant Herding Optimization","authors":"K. Vilohit, B. N, H. Rajaguru","doi":"10.1109/STCR55312.2022.10009327","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009327","url":null,"abstract":"A recent analysis found that ductal carcinoma, another name for breast cancer, is increasingly prevalent in women any time after puberty. Their brain, bones, liver, lungs, and other organs might acquire cancer as a result of their negligence during that particular time period. Hence to diagnose the breast cancer, the Decision Tree classifier can be implemented on the gene expression data. To enhance the results provided by decision tree classifier, the Elephant Herding Optimization will be used to transform the input gene expression data in this work. Principal Component Analysis is utilized for decreasing the dimensionality of gene expression data since the dimensionality of original dataset is very huge. The experiment is carried out on the dataset downloaded from the CuMiDa website. Through experiments it is found that, transform based on Elephant Herding Optimization helps the decision tree classifier for providing improved performance.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121812643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-10DOI: 10.1109/STCR55312.2022.10009199
N. Sowmya, I. Babu
Latent fingerprints were found frequently in criminal investigations. Thus, Overlapped Fingerprint Recognition (OFR) technology plays key role in many applications. The OFR technology is a relatively new area which is a challenging and critical area of research work. The conventional methods are struggles in achieving high accuracy due to improper features. Thus, this article focused on implementation of OFR technology with multiple descriptors based modified dimensionality reduction mechanism. The proposed OFR is developed with gradient variation approach by using Kirsch edge detection to overcome the problems of conventional approaches. The dimension of the extracted feature space is reduced using the Kernel Principal Component Analysis (KPCA) method. Finally, Support Vector Machine (SVM) classifier is applied to classify the overlapped region of test image by comparing with the training database. Simulation results shows that the proposed method increases accuracy, specificity and sensitivity as compared to the existing methods.
{"title":"Machine Learning System for Recognition and Classification of Overlapped Fingerprints","authors":"N. Sowmya, I. Babu","doi":"10.1109/STCR55312.2022.10009199","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009199","url":null,"abstract":"Latent fingerprints were found frequently in criminal investigations. Thus, Overlapped Fingerprint Recognition (OFR) technology plays key role in many applications. The OFR technology is a relatively new area which is a challenging and critical area of research work. The conventional methods are struggles in achieving high accuracy due to improper features. Thus, this article focused on implementation of OFR technology with multiple descriptors based modified dimensionality reduction mechanism. The proposed OFR is developed with gradient variation approach by using Kirsch edge detection to overcome the problems of conventional approaches. The dimension of the extracted feature space is reduced using the Kernel Principal Component Analysis (KPCA) method. Finally, Support Vector Machine (SVM) classifier is applied to classify the overlapped region of test image by comparing with the training database. Simulation results shows that the proposed method increases accuracy, specificity and sensitivity as compared to the existing methods.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125473281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-10DOI: 10.1109/STCR55312.2022.10009429
Mehvish Ali, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday
The growing demand for the Internet of Things in the application fields with minimum latency requirements is emerging at a rapid rate. Securing these applications not only requires the design of lightweight crypto primitives with minimal code footprint but with shorter execution times. However, despite being a vital performance indicator for deterministic time-bound applications, this has not received much attention and has often been sub-prioritised. Low-latency block cyphers employing loop unrolling design techniques are a favourable choice for securing real-time IoT applications. However, although loop unrolling increases the speed of the overall design, glitches between the unrolled round functions increase its dynamic power and energy consumption, making the cyphers unfit for low-power IoT devices. In this paper, the hybrid glitch-reduction techniques designed using different combinational and sequential circuits have been proposed. These techniques have been devised for the SIMON block cypher because of its hardware efficiency. Furthermore, the high-speed loop unrolling technique for SIMON64/128 block cypher has been analysed for low-latency behaviour in light of various trade-offs between different design metrics. These techniques have been simulated and analysed in Xilinx ISE for Artix-7 and Spartan-6 FPGA boards regarding various metrics such as power, area, latency, throughput and critical path. The results demonstrate that the proposed approaches for SIMON64/128 block cypher produces better results certifying their use for high-speed IoT applications.
{"title":"Design of Hybrid Glitch-Reduction Techniques for Loop Unrolled SIMON Block Cypher","authors":"Mehvish Ali, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday","doi":"10.1109/STCR55312.2022.10009429","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009429","url":null,"abstract":"The growing demand for the Internet of Things in the application fields with minimum latency requirements is emerging at a rapid rate. Securing these applications not only requires the design of lightweight crypto primitives with minimal code footprint but with shorter execution times. However, despite being a vital performance indicator for deterministic time-bound applications, this has not received much attention and has often been sub-prioritised. Low-latency block cyphers employing loop unrolling design techniques are a favourable choice for securing real-time IoT applications. However, although loop unrolling increases the speed of the overall design, glitches between the unrolled round functions increase its dynamic power and energy consumption, making the cyphers unfit for low-power IoT devices. In this paper, the hybrid glitch-reduction techniques designed using different combinational and sequential circuits have been proposed. These techniques have been devised for the SIMON block cypher because of its hardware efficiency. Furthermore, the high-speed loop unrolling technique for SIMON64/128 block cypher has been analysed for low-latency behaviour in light of various trade-offs between different design metrics. These techniques have been simulated and analysed in Xilinx ISE for Artix-7 and Spartan-6 FPGA boards regarding various metrics such as power, area, latency, throughput and critical path. The results demonstrate that the proposed approaches for SIMON64/128 block cypher produces better results certifying their use for high-speed IoT applications.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130839863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-10DOI: 10.1109/STCR55312.2022.10009480
S. Nizar, K. Loga, B. Caroline, S. Mahalakshmi
Photonic crystals have some unique properties if any optical fiber depends on those fundamentals it is meant to be a PCF. It is designed by using the three major elements such as core, cladding, and the PML. Here, the detection Nitrous Oxide (N2O) and Benzene (C6H6) Gas present in the atmosphere is done by designing a highly sensitive Photonic Crystal Fiber based sensor. There are many ozone depleting elements in that one of the major harm is due to (N2O) gas and it even causes many health defects to living organisms such as depression, hypoxia, psychosis, damages immune system, and loss of memory. Basically, there is a presence of (C6H6) gas in the atmosphere these elements react with the chemical compounds creating smog which breaks down at some point and then the collision between rain and snow happens resulting in contamination of water and soil. It also results in harming the human beings by creating problems such as increasing heart rate, unconsciousness, level of RBC gets decreased, and damaging the bone marrow. Due to all these reasons, at the present scenario it is very much needed to sense the Nitrous Oxide (N2O) and Benzene (C6H6) Gas at atmospheric level. The highly sensitive proposed model is designed by using the COMSOL Multiphysics software by obtaining an accurate and high performing output. The simulation results are calculated by using the final element method which results in the relative sensitivity of 99.384%, 99.937% and 9.56 × 10−11 dB/m, 0dB/m loss of confinement at the wavelength of λ = 1μm, 0.20μm for N2O and C6H6 Gas. According to the above results it is proved that the proposed gas sensor is very simple with high rate of performance and accuracy.
{"title":"Highly Sensitive Photonic Crystal Fiber based Sensor for Sensing Nitrous Oxide (N2O) and Benzene (C6H6) Gas Present in the Atmosphere","authors":"S. Nizar, K. Loga, B. Caroline, S. Mahalakshmi","doi":"10.1109/STCR55312.2022.10009480","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009480","url":null,"abstract":"Photonic crystals have some unique properties if any optical fiber depends on those fundamentals it is meant to be a PCF. It is designed by using the three major elements such as core, cladding, and the PML. Here, the detection Nitrous Oxide (N2O) and Benzene (C6H6) Gas present in the atmosphere is done by designing a highly sensitive Photonic Crystal Fiber based sensor. There are many ozone depleting elements in that one of the major harm is due to (N2O) gas and it even causes many health defects to living organisms such as depression, hypoxia, psychosis, damages immune system, and loss of memory. Basically, there is a presence of (C6H6) gas in the atmosphere these elements react with the chemical compounds creating smog which breaks down at some point and then the collision between rain and snow happens resulting in contamination of water and soil. It also results in harming the human beings by creating problems such as increasing heart rate, unconsciousness, level of RBC gets decreased, and damaging the bone marrow. Due to all these reasons, at the present scenario it is very much needed to sense the Nitrous Oxide (N2O) and Benzene (C6H6) Gas at atmospheric level. The highly sensitive proposed model is designed by using the COMSOL Multiphysics software by obtaining an accurate and high performing output. The simulation results are calculated by using the final element method which results in the relative sensitivity of 99.384%, 99.937% and 9.56 × 10−11 dB/m, 0dB/m loss of confinement at the wavelength of λ = 1μm, 0.20μm for N2O and C6H6 Gas. According to the above results it is proved that the proposed gas sensor is very simple with high rate of performance and accuracy.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-10DOI: 10.1109/STCR55312.2022.10009097
Sheena Banday, Mir Nazish, Ishfaq Sultan, M. T. Banday
PRESENT is one of the first standard hardware efficient, ultra-lightweight block cyphers designed to secure highly resource-constrained devices. The 4x4 s-boxes and 64-bit permutations provide an optimum level of confusion and diffusion in the cypher. The bitwise permutation involving the rerouting of wires provides faster diffusion in hardware, however, it is far from being an optimal choice to achieve good performance in software. Even though the 4-bit PRESENT s-box requires a small amount of memory to store the pre-defined s-box table, the overall efficiency of a block cypher is determined by both the linear and non-linear strategies used in the design. In this paper, three software techniques for implementing the PRESENT block cypher, namely direct, wide-table and combined wide-table, are being analysed and compared in KEIL MDK IDE and ARM Cortex-M3-based LPC1768 IoT development platform. The techniques have been evaluated for execution time, code footprint, and power and energy consumption. Therefore, this paper helps the designers to select the best software efficient technique as per their application use case.
{"title":"Performance Comparison of Software-Efficient Implementations of the PRESENT Block Cypher","authors":"Sheena Banday, Mir Nazish, Ishfaq Sultan, M. T. Banday","doi":"10.1109/STCR55312.2022.10009097","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009097","url":null,"abstract":"PRESENT is one of the first standard hardware efficient, ultra-lightweight block cyphers designed to secure highly resource-constrained devices. The 4x4 s-boxes and 64-bit permutations provide an optimum level of confusion and diffusion in the cypher. The bitwise permutation involving the rerouting of wires provides faster diffusion in hardware, however, it is far from being an optimal choice to achieve good performance in software. Even though the 4-bit PRESENT s-box requires a small amount of memory to store the pre-defined s-box table, the overall efficiency of a block cypher is determined by both the linear and non-linear strategies used in the design. In this paper, three software techniques for implementing the PRESENT block cypher, namely direct, wide-table and combined wide-table, are being analysed and compared in KEIL MDK IDE and ARM Cortex-M3-based LPC1768 IoT development platform. The techniques have been evaluated for execution time, code footprint, and power and energy consumption. Therefore, this paper helps the designers to select the best software efficient technique as per their application use case.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-10DOI: 10.1109/STCR55312.2022.10009305
Mary Catherine V G, Binu Paul, Vinoj P G
The demand for Robots in Elderly assistance is increasing due to the lack of human caregivers. In the context of Robot coexisting with the human beings in a home environment, for the safe and friendly interaction it is essential to endow the sense of touch through Tactile sensor systems. This paper proposes a novel scalable approach for tactile sensors based on low cost wearable conductive fabric. Fabric tactile sensor (FABTAC) is conformable with the robot body and can be used as a tactile sensing skin that perceives touch and force applied at the contact location. FABTAC sensors are developed as an array of touch sensors sewed on the cloth substrate with the stainless-steel conductive thread. The thermistor sensors are also sewed to fabric to perceive the temperature information. The FABTAC sensors are integrated on to the custom-made 3D printed Robotic hand and the tactile data is processed with a novel wearable electronic FLORA microcontroller platform. The acquired data can be used to provide a real time tactile feedback for performing assistive tasks like grasping objects of diverse profiles, avoiding slippage. The FABTAC sensors has the advantage of utilizing flexible, light weight sensors with good spatial and temporal resolution. Thus, the system can potentially aid the automation of daily life activities of the Elderly thereby enhancing the quality of their life.
{"title":"Wearable Fabric Tactile Sensors for Robotic Elderly Assistance","authors":"Mary Catherine V G, Binu Paul, Vinoj P G","doi":"10.1109/STCR55312.2022.10009305","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009305","url":null,"abstract":"The demand for Robots in Elderly assistance is increasing due to the lack of human caregivers. In the context of Robot coexisting with the human beings in a home environment, for the safe and friendly interaction it is essential to endow the sense of touch through Tactile sensor systems. This paper proposes a novel scalable approach for tactile sensors based on low cost wearable conductive fabric. Fabric tactile sensor (FABTAC) is conformable with the robot body and can be used as a tactile sensing skin that perceives touch and force applied at the contact location. FABTAC sensors are developed as an array of touch sensors sewed on the cloth substrate with the stainless-steel conductive thread. The thermistor sensors are also sewed to fabric to perceive the temperature information. The FABTAC sensors are integrated on to the custom-made 3D printed Robotic hand and the tactile data is processed with a novel wearable electronic FLORA microcontroller platform. The acquired data can be used to provide a real time tactile feedback for performing assistive tasks like grasping objects of diverse profiles, avoiding slippage. The FABTAC sensors has the advantage of utilizing flexible, light weight sensors with good spatial and temporal resolution. Thus, the system can potentially aid the automation of daily life activities of the Elderly thereby enhancing the quality of their life.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130807683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-10DOI: 10.1109/STCR55312.2022.10009563
G. C, A. S, Sudharsan S, Veewin M, Rishi M
The proposed automatic water appropriation system is utilized to convey the city water similarly to all road pipe Level sensors and flow meter is used to sense the quantity of water present inside the storage tank and measures the flow rate. Both the level and flow sensor are connected with the PLC. If the water reaches eighty percentages inside the storage tank, then motor need to be turned off automatically using relay. By mounting the flow meter at each distribution point and starting point by comparing initial net flow rate with the sum of all flow rate at each distribution point is equal or not. If not there’s some leakage in a distribution system. By using this method, we can find the water theft and with the help of solenoid valve if we sense any leakage in the system, we can close the valve by using this method not only finding leakage and theft also we can also save water and we add up the ph sensor to test ph valve whether water is drinkable or not.
{"title":"Water Theft and Leakage Identification in Distributed System","authors":"G. C, A. S, Sudharsan S, Veewin M, Rishi M","doi":"10.1109/STCR55312.2022.10009563","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009563","url":null,"abstract":"The proposed automatic water appropriation system is utilized to convey the city water similarly to all road pipe Level sensors and flow meter is used to sense the quantity of water present inside the storage tank and measures the flow rate. Both the level and flow sensor are connected with the PLC. If the water reaches eighty percentages inside the storage tank, then motor need to be turned off automatically using relay. By mounting the flow meter at each distribution point and starting point by comparing initial net flow rate with the sum of all flow rate at each distribution point is equal or not. If not there’s some leakage in a distribution system. By using this method, we can find the water theft and with the help of solenoid valve if we sense any leakage in the system, we can close the valve by using this method not only finding leakage and theft also we can also save water and we add up the ph sensor to test ph valve whether water is drinkable or not.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129591936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-10DOI: 10.1109/STCR55312.2022.10009112
Irtiqa Tariq, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday
The present era is witnessing IoT as a promising upcoming field affecting almost all spheres of human lives. However, IoT is facing more significant challenges due to the constrained nature of the devices. The most crucial challenge that hinders its widespread applicability is security. The exponential rise in security attacks necessitates ensuring the confidentiality, integrity and authentication of transmitted data sensed by these resource-limited devices. Although the new field of lightweight cryptography is attempting to secure low-end devices, conventional AES block cypher is still preferred due to the absence of standard lightweight crypto primitive addressing all three security aspects. Moreover, various integrity and authentication attacks can still compromise the encrypted data, which justifies the need for hashing and MAC algorithms. In this paper, two hashing (MD5 and SHA-256) and one authentication (HMAC) techniques available in the standard and well-tested ARM mBed TLS library have been used with the AES block cypher to achieve multi-level security. All these primitives have been implemented in KEIL MDK IDE and on ARM Cortex-M3-based LPC1768 hardware development IoT platform. Moreover, these primitives have been analysed and compared in real-time regarding various design metrics such as execution time, memory footprint, power and energy consumption using ULINKpro and ULINKplus debug adapters. The results aid the designers in selecting proper encryption, hashing and MAC algorithms per the availability of resources with various IoT development platforms.
{"title":"A Performance Comparison of Hashed and Authenticated Advanced Encryption Standard","authors":"Irtiqa Tariq, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday","doi":"10.1109/STCR55312.2022.10009112","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009112","url":null,"abstract":"The present era is witnessing IoT as a promising upcoming field affecting almost all spheres of human lives. However, IoT is facing more significant challenges due to the constrained nature of the devices. The most crucial challenge that hinders its widespread applicability is security. The exponential rise in security attacks necessitates ensuring the confidentiality, integrity and authentication of transmitted data sensed by these resource-limited devices. Although the new field of lightweight cryptography is attempting to secure low-end devices, conventional AES block cypher is still preferred due to the absence of standard lightweight crypto primitive addressing all three security aspects. Moreover, various integrity and authentication attacks can still compromise the encrypted data, which justifies the need for hashing and MAC algorithms. In this paper, two hashing (MD5 and SHA-256) and one authentication (HMAC) techniques available in the standard and well-tested ARM mBed TLS library have been used with the AES block cypher to achieve multi-level security. All these primitives have been implemented in KEIL MDK IDE and on ARM Cortex-M3-based LPC1768 hardware development IoT platform. Moreover, these primitives have been analysed and compared in real-time regarding various design metrics such as execution time, memory footprint, power and energy consumption using ULINKpro and ULINKplus debug adapters. The results aid the designers in selecting proper encryption, hashing and MAC algorithms per the availability of resources with various IoT development platforms.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128212386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-10DOI: 10.1109/STCR55312.2022.10009364
Sameena, E. Sreenivasulu
Low light image enhancement plays the crucial role in night vision applications, and road monitoring systems of artificial intelligence assisted vehicles. But the conventional methods are unable to remove the darkness from source images and resulted in poor visibility performance. Thus, this article proposed an advanced low light image enhancement approach using dark channel prior (DCP). Initially, light reflection (retinex) angles are identified and red channel estimation was used to restore light direction attention. Further, DCP is used to identify the background darkness region with light illumination properties. Then, new anthropic light properties were generated by using transmission map estimation and refinement. Further, image light radiance is recovered by using this updated transmission map values, which generates darkness removed image. Finally, denoising operation is performed to get the best visual quality output image. The simulations conducted on ExDark dataset shows that the proposed method resulted in superior subjective and objective performance as compared to state of art approaches.
{"title":"Low-light Color Image Enhancement based on Dark Channel Prior with Retinex Model","authors":"Sameena, E. Sreenivasulu","doi":"10.1109/STCR55312.2022.10009364","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009364","url":null,"abstract":"Low light image enhancement plays the crucial role in night vision applications, and road monitoring systems of artificial intelligence assisted vehicles. But the conventional methods are unable to remove the darkness from source images and resulted in poor visibility performance. Thus, this article proposed an advanced low light image enhancement approach using dark channel prior (DCP). Initially, light reflection (retinex) angles are identified and red channel estimation was used to restore light direction attention. Further, DCP is used to identify the background darkness region with light illumination properties. Then, new anthropic light properties were generated by using transmission map estimation and refinement. Further, image light radiance is recovered by using this updated transmission map values, which generates darkness removed image. Finally, denoising operation is performed to get the best visual quality output image. The simulations conducted on ExDark dataset shows that the proposed method resulted in superior subjective and objective performance as compared to state of art approaches.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127111924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-10DOI: 10.1109/STCR55312.2022.10009386
Sannasi Chakravarthy S R, H. Rajaguru, S. Chidambaram
Being a deadly disease, breast cancer is becoming the more progressive one in providing higher mortality for females around the world. Thereby, the need for an appropriate strategy is always required for earlier breast cancer diagnosis. The physicians utilize the Computer-Aided Diagnosis (CAD) tool for effective and tireless detection of such cancers. In this regard, the work is intended to design a CAD system for breast cancer diagnosis in a timely manner. The implementation starts with the use of Wisconsin Breast Cancer dataset. After performing preprocessing and visual analysis of the input dataset, feature selection is performed to improve the efficiency of the CAD system. This can be done by using the recently evolved Ebola Optimization Algorithm (EOA). This algorithm is based on an effective approach used in the propagation of the Ebola virus among individuals. After feature selection, the dominant features are then classified with the aid of a mixture Kernel Support Vector Machine (mK-SVM) algorithm. Additionally, the work utilized the Linear SVM, and KNN algorithms for the experimental analysis and comparison. As a result, the mK-SVM together with EOA provides maximum accuracy of 97.19% in classifying the input as either benign severity or malignant case.
{"title":"Processing of Wisconsin Breast Cancer Data using Ebola Optimization Algorithm with Mixture Kernel SVM","authors":"Sannasi Chakravarthy S R, H. Rajaguru, S. Chidambaram","doi":"10.1109/STCR55312.2022.10009386","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009386","url":null,"abstract":"Being a deadly disease, breast cancer is becoming the more progressive one in providing higher mortality for females around the world. Thereby, the need for an appropriate strategy is always required for earlier breast cancer diagnosis. The physicians utilize the Computer-Aided Diagnosis (CAD) tool for effective and tireless detection of such cancers. In this regard, the work is intended to design a CAD system for breast cancer diagnosis in a timely manner. The implementation starts with the use of Wisconsin Breast Cancer dataset. After performing preprocessing and visual analysis of the input dataset, feature selection is performed to improve the efficiency of the CAD system. This can be done by using the recently evolved Ebola Optimization Algorithm (EOA). This algorithm is based on an effective approach used in the propagation of the Ebola virus among individuals. After feature selection, the dominant features are then classified with the aid of a mixture Kernel Support Vector Machine (mK-SVM) algorithm. Additionally, the work utilized the Linear SVM, and KNN algorithms for the experimental analysis and comparison. As a result, the mK-SVM together with EOA provides maximum accuracy of 97.19% in classifying the input as either benign severity or malignant case.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126610711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}