首页 > 最新文献

2022 Smart Technologies, Communication and Robotics (STCR)最新文献

英文 中文
Improvisation of Decision Tree Classification Performance in Breast Cancer Diagnosis using Elephant Herding Optimization 利用象群优化改进乳腺癌诊断决策树分类性能
Pub Date : 2022-12-10 DOI: 10.1109/STCR55312.2022.10009327
K. Vilohit, B. N, H. Rajaguru
A recent analysis found that ductal carcinoma, another name for breast cancer, is increasingly prevalent in women any time after puberty. Their brain, bones, liver, lungs, and other organs might acquire cancer as a result of their negligence during that particular time period. Hence to diagnose the breast cancer, the Decision Tree classifier can be implemented on the gene expression data. To enhance the results provided by decision tree classifier, the Elephant Herding Optimization will be used to transform the input gene expression data in this work. Principal Component Analysis is utilized for decreasing the dimensionality of gene expression data since the dimensionality of original dataset is very huge. The experiment is carried out on the dataset downloaded from the CuMiDa website. Through experiments it is found that, transform based on Elephant Herding Optimization helps the decision tree classifier for providing improved performance.
最近的一项分析发现,导管癌(乳腺癌的另一种说法)在青春期后的女性中越来越普遍。他们的大脑、骨骼、肝脏、肺部和其他器官可能会因为他们在这个特定时期的疏忽而患上癌症。因此,决策树分类器可以在基因表达数据上实现乳腺癌的诊断。为了增强决策树分类器提供的结果,本工作将使用大象放牧优化对输入的基因表达数据进行转换。由于原始数据的维数非常大,采用主成分分析对基因表达数据进行降维处理。实验在从CuMiDa网站下载的数据集上进行。通过实验发现,基于象群优化的变换有助于提高决策树分类器的性能。
{"title":"Improvisation of Decision Tree Classification Performance in Breast Cancer Diagnosis using Elephant Herding Optimization","authors":"K. Vilohit, B. N, H. Rajaguru","doi":"10.1109/STCR55312.2022.10009327","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009327","url":null,"abstract":"A recent analysis found that ductal carcinoma, another name for breast cancer, is increasingly prevalent in women any time after puberty. Their brain, bones, liver, lungs, and other organs might acquire cancer as a result of their negligence during that particular time period. Hence to diagnose the breast cancer, the Decision Tree classifier can be implemented on the gene expression data. To enhance the results provided by decision tree classifier, the Elephant Herding Optimization will be used to transform the input gene expression data in this work. Principal Component Analysis is utilized for decreasing the dimensionality of gene expression data since the dimensionality of original dataset is very huge. The experiment is carried out on the dataset downloaded from the CuMiDa website. Through experiments it is found that, transform based on Elephant Herding Optimization helps the decision tree classifier for providing improved performance.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121812643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning System for Recognition and Classification of Overlapped Fingerprints 重叠指纹识别与分类的机器学习系统
Pub Date : 2022-12-10 DOI: 10.1109/STCR55312.2022.10009199
N. Sowmya, I. Babu
Latent fingerprints were found frequently in criminal investigations. Thus, Overlapped Fingerprint Recognition (OFR) technology plays key role in many applications. The OFR technology is a relatively new area which is a challenging and critical area of research work. The conventional methods are struggles in achieving high accuracy due to improper features. Thus, this article focused on implementation of OFR technology with multiple descriptors based modified dimensionality reduction mechanism. The proposed OFR is developed with gradient variation approach by using Kirsch edge detection to overcome the problems of conventional approaches. The dimension of the extracted feature space is reduced using the Kernel Principal Component Analysis (KPCA) method. Finally, Support Vector Machine (SVM) classifier is applied to classify the overlapped region of test image by comparing with the training database. Simulation results shows that the proposed method increases accuracy, specificity and sensitivity as compared to the existing methods.
在刑事调查中经常发现潜在指纹。因此,重叠指纹识别(OFR)技术在许多应用中发挥着关键作用。OFR技术是一个相对较新的领域,是一个具有挑战性和关键的研究工作领域。传统的方法由于特征不合适,难以达到较高的精度。因此,本文主要研究基于多描述符的改进降维机制的OFR技术实现。利用Kirsch边缘检测的梯度变化方法,克服了传统OFR方法存在的问题。利用核主成分分析(KPCA)方法对提取的特征空间进行降维。最后,通过与训练库的对比,应用支持向量机分类器对测试图像的重叠区域进行分类。仿真结果表明,与现有方法相比,该方法具有更高的准确性、特异性和灵敏度。
{"title":"Machine Learning System for Recognition and Classification of Overlapped Fingerprints","authors":"N. Sowmya, I. Babu","doi":"10.1109/STCR55312.2022.10009199","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009199","url":null,"abstract":"Latent fingerprints were found frequently in criminal investigations. Thus, Overlapped Fingerprint Recognition (OFR) technology plays key role in many applications. The OFR technology is a relatively new area which is a challenging and critical area of research work. The conventional methods are struggles in achieving high accuracy due to improper features. Thus, this article focused on implementation of OFR technology with multiple descriptors based modified dimensionality reduction mechanism. The proposed OFR is developed with gradient variation approach by using Kirsch edge detection to overcome the problems of conventional approaches. The dimension of the extracted feature space is reduced using the Kernel Principal Component Analysis (KPCA) method. Finally, Support Vector Machine (SVM) classifier is applied to classify the overlapped region of test image by comparing with the training database. Simulation results shows that the proposed method increases accuracy, specificity and sensitivity as compared to the existing methods.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125473281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Hybrid Glitch-Reduction Techniques for Loop Unrolled SIMON Block Cypher
Pub Date : 2022-12-10 DOI: 10.1109/STCR55312.2022.10009429
Mehvish Ali, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday
The growing demand for the Internet of Things in the application fields with minimum latency requirements is emerging at a rapid rate. Securing these applications not only requires the design of lightweight crypto primitives with minimal code footprint but with shorter execution times. However, despite being a vital performance indicator for deterministic time-bound applications, this has not received much attention and has often been sub-prioritised. Low-latency block cyphers employing loop unrolling design techniques are a favourable choice for securing real-time IoT applications. However, although loop unrolling increases the speed of the overall design, glitches between the unrolled round functions increase its dynamic power and energy consumption, making the cyphers unfit for low-power IoT devices. In this paper, the hybrid glitch-reduction techniques designed using different combinational and sequential circuits have been proposed. These techniques have been devised for the SIMON block cypher because of its hardware efficiency. Furthermore, the high-speed loop unrolling technique for SIMON64/128 block cypher has been analysed for low-latency behaviour in light of various trade-offs between different design metrics. These techniques have been simulated and analysed in Xilinx ISE for Artix-7 and Spartan-6 FPGA boards regarding various metrics such as power, area, latency, throughput and critical path. The results demonstrate that the proposed approaches for SIMON64/128 block cypher produces better results certifying their use for high-speed IoT applications.
在时延要求最低的应用领域,物联网的需求正在快速增长。保护这些应用程序不仅需要设计具有最小代码占用空间的轻量级加密原语,而且需要更短的执行时间。然而,尽管它是确定性时限应用程序的重要性能指标,但它并没有受到太多关注,而且经常被列为次优先级。采用循环展开设计技术的低延迟分组密码是保护实时物联网应用的有利选择。然而,尽管环路展开提高了整体设计的速度,但展开的圆形功能之间的故障增加了其动态功率和能耗,使得密码不适合低功耗物联网设备。本文提出了采用不同组合电路和顺序电路设计的混合小差错减少技术。这些技术是针对SIMON分组密码设计的,因为它的硬件效率高。此外,根据不同设计指标之间的各种权衡,分析了SIMON64/128分组密码的高速环路展开技术的低延迟行为。这些技术已经在Xilinx ISE中针对Artix-7和Spartan-6 FPGA板进行了模拟和分析,涉及各种指标,如功率,面积,延迟,吞吐量和关键路径。结果表明,SIMON64/128分组密码的方法产生了更好的结果,证明了它们在高速物联网应用中的使用。
{"title":"Design of Hybrid Glitch-Reduction Techniques for Loop Unrolled SIMON Block Cypher","authors":"Mehvish Ali, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday","doi":"10.1109/STCR55312.2022.10009429","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009429","url":null,"abstract":"The growing demand for the Internet of Things in the application fields with minimum latency requirements is emerging at a rapid rate. Securing these applications not only requires the design of lightweight crypto primitives with minimal code footprint but with shorter execution times. However, despite being a vital performance indicator for deterministic time-bound applications, this has not received much attention and has often been sub-prioritised. Low-latency block cyphers employing loop unrolling design techniques are a favourable choice for securing real-time IoT applications. However, although loop unrolling increases the speed of the overall design, glitches between the unrolled round functions increase its dynamic power and energy consumption, making the cyphers unfit for low-power IoT devices. In this paper, the hybrid glitch-reduction techniques designed using different combinational and sequential circuits have been proposed. These techniques have been devised for the SIMON block cypher because of its hardware efficiency. Furthermore, the high-speed loop unrolling technique for SIMON64/128 block cypher has been analysed for low-latency behaviour in light of various trade-offs between different design metrics. These techniques have been simulated and analysed in Xilinx ISE for Artix-7 and Spartan-6 FPGA boards regarding various metrics such as power, area, latency, throughput and critical path. The results demonstrate that the proposed approaches for SIMON64/128 block cypher produces better results certifying their use for high-speed IoT applications.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130839863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Highly Sensitive Photonic Crystal Fiber based Sensor for Sensing Nitrous Oxide (N2O) and Benzene (C6H6) Gas Present in the Atmosphere 用于检测大气中氧化亚氮(N2O)和苯(C6H6)气体的高灵敏度光子晶体光纤传感器
Pub Date : 2022-12-10 DOI: 10.1109/STCR55312.2022.10009480
S. Nizar, K. Loga, B. Caroline, S. Mahalakshmi
Photonic crystals have some unique properties if any optical fiber depends on those fundamentals it is meant to be a PCF. It is designed by using the three major elements such as core, cladding, and the PML. Here, the detection Nitrous Oxide (N2O) and Benzene (C6H6) Gas present in the atmosphere is done by designing a highly sensitive Photonic Crystal Fiber based sensor. There are many ozone depleting elements in that one of the major harm is due to (N2O) gas and it even causes many health defects to living organisms such as depression, hypoxia, psychosis, damages immune system, and loss of memory. Basically, there is a presence of (C6H6) gas in the atmosphere these elements react with the chemical compounds creating smog which breaks down at some point and then the collision between rain and snow happens resulting in contamination of water and soil. It also results in harming the human beings by creating problems such as increasing heart rate, unconsciousness, level of RBC gets decreased, and damaging the bone marrow. Due to all these reasons, at the present scenario it is very much needed to sense the Nitrous Oxide (N2O) and Benzene (C6H6) Gas at atmospheric level. The highly sensitive proposed model is designed by using the COMSOL Multiphysics software by obtaining an accurate and high performing output. The simulation results are calculated by using the final element method which results in the relative sensitivity of 99.384%, 99.937% and 9.56 × 10−11 dB/m, 0dB/m loss of confinement at the wavelength of λ = 1μm, 0.20μm for N2O and C6H6 Gas. According to the above results it is proved that the proposed gas sensor is very simple with high rate of performance and accuracy.
光子晶体有一些独特的特性,如果任何光纤依赖于这些基本原理,它就意味着是一个光子晶体。它的设计使用了三个主要元素,如堆芯、包层和PML。在这里,通过设计一个高灵敏度的光子晶体光纤传感器来检测大气中存在的一氧化二氮(N2O)和苯(C6H6)气体。有许多消耗臭氧的元素,其中一个主要的危害是由于(N2O)气体,它甚至导致许多健康缺陷的生物体,如抑郁症,缺氧,精神病,损害免疫系统,丧失记忆。基本上,大气中存在(C6H6)气体,这些元素与化合物反应产生烟雾,烟雾在某一点上分解,然后雨雪之间的碰撞发生,导致水和土壤污染。它还会引起心率加快、意识不清、红细胞水平下降、骨髓损伤等问题,对人体造成伤害。由于所有这些原因,在目前的情况下,非常需要在大气水平上检测一氧化二氮(N2O)和苯(C6H6)气体。利用COMSOL Multiphysics软件设计了高灵敏度的模型,获得了精确、高性能的输出。采用终元法对模拟结果进行了计算,结果表明,N2O和C6H6气体在λ = 1μm、0.20μm波长处的相对灵敏度分别为99.384%、99.937%和9.56 × 10−11 dB/m,约束损耗为0dB/m。实验结果表明,所设计的气体传感器结构简单,具有较高的性能和精度。
{"title":"Highly Sensitive Photonic Crystal Fiber based Sensor for Sensing Nitrous Oxide (N2O) and Benzene (C6H6) Gas Present in the Atmosphere","authors":"S. Nizar, K. Loga, B. Caroline, S. Mahalakshmi","doi":"10.1109/STCR55312.2022.10009480","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009480","url":null,"abstract":"Photonic crystals have some unique properties if any optical fiber depends on those fundamentals it is meant to be a PCF. It is designed by using the three major elements such as core, cladding, and the PML. Here, the detection Nitrous Oxide (N2O) and Benzene (C6H6) Gas present in the atmosphere is done by designing a highly sensitive Photonic Crystal Fiber based sensor. There are many ozone depleting elements in that one of the major harm is due to (N2O) gas and it even causes many health defects to living organisms such as depression, hypoxia, psychosis, damages immune system, and loss of memory. Basically, there is a presence of (C6H6) gas in the atmosphere these elements react with the chemical compounds creating smog which breaks down at some point and then the collision between rain and snow happens resulting in contamination of water and soil. It also results in harming the human beings by creating problems such as increasing heart rate, unconsciousness, level of RBC gets decreased, and damaging the bone marrow. Due to all these reasons, at the present scenario it is very much needed to sense the Nitrous Oxide (N2O) and Benzene (C6H6) Gas at atmospheric level. The highly sensitive proposed model is designed by using the COMSOL Multiphysics software by obtaining an accurate and high performing output. The simulation results are calculated by using the final element method which results in the relative sensitivity of 99.384%, 99.937% and 9.56 × 10−11 dB/m, 0dB/m loss of confinement at the wavelength of λ = 1μm, 0.20μm for N2O and C6H6 Gas. According to the above results it is proved that the proposed gas sensor is very simple with high rate of performance and accuracy.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129223759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison of Software-Efficient Implementations of the PRESENT Block Cypher 当前分组密码的软件高效实现的性能比较
Pub Date : 2022-12-10 DOI: 10.1109/STCR55312.2022.10009097
Sheena Banday, Mir Nazish, Ishfaq Sultan, M. T. Banday
PRESENT is one of the first standard hardware efficient, ultra-lightweight block cyphers designed to secure highly resource-constrained devices. The 4x4 s-boxes and 64-bit permutations provide an optimum level of confusion and diffusion in the cypher. The bitwise permutation involving the rerouting of wires provides faster diffusion in hardware, however, it is far from being an optimal choice to achieve good performance in software. Even though the 4-bit PRESENT s-box requires a small amount of memory to store the pre-defined s-box table, the overall efficiency of a block cypher is determined by both the linear and non-linear strategies used in the design. In this paper, three software techniques for implementing the PRESENT block cypher, namely direct, wide-table and combined wide-table, are being analysed and compared in KEIL MDK IDE and ARM Cortex-M3-based LPC1768 IoT development platform. The techniques have been evaluated for execution time, code footprint, and power and energy consumption. Therefore, this paper helps the designers to select the best software efficient technique as per their application use case.
PRESENT是第一个标准的硬件高效,超轻量块密码,旨在保护高度资源受限的设备。4x4 s-box和64位排列在密码中提供了最佳的混淆和扩散级别。涉及到线路重新路由的按位排列在硬件中提供了更快的扩散,然而,它远不是在软件中实现良好性能的最佳选择。尽管4位PRESENT s-box需要少量内存来存储预定义的s-box表,但块密码的总体效率是由设计中使用的线性和非线性策略决定的。本文分析比较了在KEIL MDK IDE和基于ARM cortex - m3的LPC1768物联网开发平台上实现PRESENT分组密码的三种软件技术,即直接、宽表和组合宽表。对这些技术进行了执行时间、代码占用、功率和能耗的评估。因此,本文帮助设计人员根据他们的应用程序用例选择最佳的软件效率技术。
{"title":"Performance Comparison of Software-Efficient Implementations of the PRESENT Block Cypher","authors":"Sheena Banday, Mir Nazish, Ishfaq Sultan, M. T. Banday","doi":"10.1109/STCR55312.2022.10009097","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009097","url":null,"abstract":"PRESENT is one of the first standard hardware efficient, ultra-lightweight block cyphers designed to secure highly resource-constrained devices. The 4x4 s-boxes and 64-bit permutations provide an optimum level of confusion and diffusion in the cypher. The bitwise permutation involving the rerouting of wires provides faster diffusion in hardware, however, it is far from being an optimal choice to achieve good performance in software. Even though the 4-bit PRESENT s-box requires a small amount of memory to store the pre-defined s-box table, the overall efficiency of a block cypher is determined by both the linear and non-linear strategies used in the design. In this paper, three software techniques for implementing the PRESENT block cypher, namely direct, wide-table and combined wide-table, are being analysed and compared in KEIL MDK IDE and ARM Cortex-M3-based LPC1768 IoT development platform. The techniques have been evaluated for execution time, code footprint, and power and energy consumption. Therefore, this paper helps the designers to select the best software efficient technique as per their application use case.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wearable Fabric Tactile Sensors for Robotic Elderly Assistance 用于老年机器人辅助的可穿戴织物触觉传感器
Pub Date : 2022-12-10 DOI: 10.1109/STCR55312.2022.10009305
Mary Catherine V G, Binu Paul, Vinoj P G
The demand for Robots in Elderly assistance is increasing due to the lack of human caregivers. In the context of Robot coexisting with the human beings in a home environment, for the safe and friendly interaction it is essential to endow the sense of touch through Tactile sensor systems. This paper proposes a novel scalable approach for tactile sensors based on low cost wearable conductive fabric. Fabric tactile sensor (FABTAC) is conformable with the robot body and can be used as a tactile sensing skin that perceives touch and force applied at the contact location. FABTAC sensors are developed as an array of touch sensors sewed on the cloth substrate with the stainless-steel conductive thread. The thermistor sensors are also sewed to fabric to perceive the temperature information. The FABTAC sensors are integrated on to the custom-made 3D printed Robotic hand and the tactile data is processed with a novel wearable electronic FLORA microcontroller platform. The acquired data can be used to provide a real time tactile feedback for performing assistive tasks like grasping objects of diverse profiles, avoiding slippage. The FABTAC sensors has the advantage of utilizing flexible, light weight sensors with good spatial and temporal resolution. Thus, the system can potentially aid the automation of daily life activities of the Elderly thereby enhancing the quality of their life.
由于人类照顾者的缺乏,对老年人援助机器人的需求正在增加。在机器人与人类在家庭环境中共存的背景下,为了安全友好的互动,通过触觉传感器系统赋予触觉是必不可少的。提出了一种基于低成本可穿戴导电织物的触觉传感器的新型可扩展方法。织物触觉传感器(FABTAC)与机器人本体贴合,可作为触觉感应皮肤,感知在接触部位施加的触觉和力。FABTAC传感器是一种用不锈钢导电线缝在织物衬底上的触摸传感器阵列。热敏电阻传感器也缝在织物上,以感知温度信息。FABTAC传感器集成在定制的3D打印机械手上,触觉数据通过新型可穿戴电子FLORA微控制器平台进行处理。获取的数据可用于提供实时触觉反馈,以执行辅助任务,如抓取不同轮廓的物体,避免打滑。FABTAC传感器具有灵活、重量轻、具有良好空间和时间分辨率的优点。因此,该系统可协助长者实现日常生活活动的自动化,从而提高他们的生活质素。
{"title":"Wearable Fabric Tactile Sensors for Robotic Elderly Assistance","authors":"Mary Catherine V G, Binu Paul, Vinoj P G","doi":"10.1109/STCR55312.2022.10009305","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009305","url":null,"abstract":"The demand for Robots in Elderly assistance is increasing due to the lack of human caregivers. In the context of Robot coexisting with the human beings in a home environment, for the safe and friendly interaction it is essential to endow the sense of touch through Tactile sensor systems. This paper proposes a novel scalable approach for tactile sensors based on low cost wearable conductive fabric. Fabric tactile sensor (FABTAC) is conformable with the robot body and can be used as a tactile sensing skin that perceives touch and force applied at the contact location. FABTAC sensors are developed as an array of touch sensors sewed on the cloth substrate with the stainless-steel conductive thread. The thermistor sensors are also sewed to fabric to perceive the temperature information. The FABTAC sensors are integrated on to the custom-made 3D printed Robotic hand and the tactile data is processed with a novel wearable electronic FLORA microcontroller platform. The acquired data can be used to provide a real time tactile feedback for performing assistive tasks like grasping objects of diverse profiles, avoiding slippage. The FABTAC sensors has the advantage of utilizing flexible, light weight sensors with good spatial and temporal resolution. Thus, the system can potentially aid the automation of daily life activities of the Elderly thereby enhancing the quality of their life.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130807683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Water Theft and Leakage Identification in Distributed System 分布式系统中的水盗窃与泄漏识别
Pub Date : 2022-12-10 DOI: 10.1109/STCR55312.2022.10009563
G. C, A. S, Sudharsan S, Veewin M, Rishi M
The proposed automatic water appropriation system is utilized to convey the city water similarly to all road pipe Level sensors and flow meter is used to sense the quantity of water present inside the storage tank and measures the flow rate. Both the level and flow sensor are connected with the PLC. If the water reaches eighty percentages inside the storage tank, then motor need to be turned off automatically using relay. By mounting the flow meter at each distribution point and starting point by comparing initial net flow rate with the sum of all flow rate at each distribution point is equal or not. If not there’s some leakage in a distribution system. By using this method, we can find the water theft and with the help of solenoid valve if we sense any leakage in the system, we can close the valve by using this method not only finding leakage and theft also we can also save water and we add up the ph sensor to test ph valve whether water is drinkable or not.
所提出的自动用水系统用于输送城市用水,类似于所有道路管道,液位传感器和流量计用于感知储罐内存在的水量并测量流量。液位和流量传感器都与PLC相连。如果水箱内的水达到80%,则需要使用继电器自动关闭电机。通过在每个配点和起点安装流量计,比较初始净流量与每个配点所有流量之和是否相等。如果没有,配电系统有泄漏。利用该方法,可以发现水的盗窃,如果检测到系统中有任何泄漏,可以通过电磁阀关闭阀门,不仅可以发现漏水和盗窃,还可以节约用水,并且我们添加ph传感器来测试ph阀的水是否可以饮用。
{"title":"Water Theft and Leakage Identification in Distributed System","authors":"G. C, A. S, Sudharsan S, Veewin M, Rishi M","doi":"10.1109/STCR55312.2022.10009563","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009563","url":null,"abstract":"The proposed automatic water appropriation system is utilized to convey the city water similarly to all road pipe Level sensors and flow meter is used to sense the quantity of water present inside the storage tank and measures the flow rate. Both the level and flow sensor are connected with the PLC. If the water reaches eighty percentages inside the storage tank, then motor need to be turned off automatically using relay. By mounting the flow meter at each distribution point and starting point by comparing initial net flow rate with the sum of all flow rate at each distribution point is equal or not. If not there’s some leakage in a distribution system. By using this method, we can find the water theft and with the help of solenoid valve if we sense any leakage in the system, we can close the valve by using this method not only finding leakage and theft also we can also save water and we add up the ph sensor to test ph valve whether water is drinkable or not.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129591936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance Comparison of Hashed and Authenticated Advanced Encryption Standard 哈希和认证高级加密标准的性能比较
Pub Date : 2022-12-10 DOI: 10.1109/STCR55312.2022.10009112
Irtiqa Tariq, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday
The present era is witnessing IoT as a promising upcoming field affecting almost all spheres of human lives. However, IoT is facing more significant challenges due to the constrained nature of the devices. The most crucial challenge that hinders its widespread applicability is security. The exponential rise in security attacks necessitates ensuring the confidentiality, integrity and authentication of transmitted data sensed by these resource-limited devices. Although the new field of lightweight cryptography is attempting to secure low-end devices, conventional AES block cypher is still preferred due to the absence of standard lightweight crypto primitive addressing all three security aspects. Moreover, various integrity and authentication attacks can still compromise the encrypted data, which justifies the need for hashing and MAC algorithms. In this paper, two hashing (MD5 and SHA-256) and one authentication (HMAC) techniques available in the standard and well-tested ARM mBed TLS library have been used with the AES block cypher to achieve multi-level security. All these primitives have been implemented in KEIL MDK IDE and on ARM Cortex-M3-based LPC1768 hardware development IoT platform. Moreover, these primitives have been analysed and compared in real-time regarding various design metrics such as execution time, memory footprint, power and energy consumption using ULINKpro and ULINKplus debug adapters. The results aid the designers in selecting proper encryption, hashing and MAC algorithms per the availability of resources with various IoT development platforms.
当今时代正在见证物联网作为一个有前途的即将到来的领域,影响着人类生活的几乎所有领域。然而,由于设备的局限性,物联网正面临着更重大的挑战。阻碍其广泛应用的最关键挑战是安全性。安全攻击呈指数级增长,需要确保这些资源有限的设备感知到的传输数据的机密性、完整性和身份验证。尽管轻量级加密的新领域正试图保护低端设备,但传统的AES块密码仍然是首选,因为缺乏解决所有三个安全方面的标准轻量级加密原语。此外,各种完整性和身份验证攻击仍然可能危及加密的数据,这证明需要散列和MAC算法。在本文中,两种哈希(MD5和SHA-256)和一种认证(HMAC)技术在标准和经过良好测试的ARM mBed TLS库中可用,并与AES块密码一起使用,以实现多级安全。所有这些原语都已在KEIL MDK IDE和基于ARM cortex - m3的LPC1768硬件开发物联网平台上实现。此外,使用ULINKpro和ULINKplus调试适配器,对这些原语进行了实时分析和比较,涉及各种设计指标,如执行时间、内存占用、功率和能耗。结果有助于设计人员根据各种物联网开发平台的资源可用性选择适当的加密,散列和MAC算法。
{"title":"A Performance Comparison of Hashed and Authenticated Advanced Encryption Standard","authors":"Irtiqa Tariq, Mir Nazish, Suhail Ashaq, Ishfaq Sultan, M. T. Banday","doi":"10.1109/STCR55312.2022.10009112","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009112","url":null,"abstract":"The present era is witnessing IoT as a promising upcoming field affecting almost all spheres of human lives. However, IoT is facing more significant challenges due to the constrained nature of the devices. The most crucial challenge that hinders its widespread applicability is security. The exponential rise in security attacks necessitates ensuring the confidentiality, integrity and authentication of transmitted data sensed by these resource-limited devices. Although the new field of lightweight cryptography is attempting to secure low-end devices, conventional AES block cypher is still preferred due to the absence of standard lightweight crypto primitive addressing all three security aspects. Moreover, various integrity and authentication attacks can still compromise the encrypted data, which justifies the need for hashing and MAC algorithms. In this paper, two hashing (MD5 and SHA-256) and one authentication (HMAC) techniques available in the standard and well-tested ARM mBed TLS library have been used with the AES block cypher to achieve multi-level security. All these primitives have been implemented in KEIL MDK IDE and on ARM Cortex-M3-based LPC1768 hardware development IoT platform. Moreover, these primitives have been analysed and compared in real-time regarding various design metrics such as execution time, memory footprint, power and energy consumption using ULINKpro and ULINKplus debug adapters. The results aid the designers in selecting proper encryption, hashing and MAC algorithms per the availability of resources with various IoT development platforms.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128212386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-light Color Image Enhancement based on Dark Channel Prior with Retinex Model 基于暗通道先验的Retinex模型弱光彩色图像增强
Pub Date : 2022-12-10 DOI: 10.1109/STCR55312.2022.10009364
Sameena, E. Sreenivasulu
Low light image enhancement plays the crucial role in night vision applications, and road monitoring systems of artificial intelligence assisted vehicles. But the conventional methods are unable to remove the darkness from source images and resulted in poor visibility performance. Thus, this article proposed an advanced low light image enhancement approach using dark channel prior (DCP). Initially, light reflection (retinex) angles are identified and red channel estimation was used to restore light direction attention. Further, DCP is used to identify the background darkness region with light illumination properties. Then, new anthropic light properties were generated by using transmission map estimation and refinement. Further, image light radiance is recovered by using this updated transmission map values, which generates darkness removed image. Finally, denoising operation is performed to get the best visual quality output image. The simulations conducted on ExDark dataset shows that the proposed method resulted in superior subjective and objective performance as compared to state of art approaches.
弱光图像增强在夜视应用和人工智能辅助车辆道路监控系统中起着至关重要的作用。但是传统的方法无法去除源图像中的黑暗,导致图像的可见性较差。为此,本文提出了一种基于暗通道先验(DCP)的弱光图像增强方法。首先,识别光反射(视网膜)角度,并使用红色通道估计来恢复光的方向注意力。进一步,利用DCP识别具有光照特性的背景暗区。然后,通过透射图估计和细化,生成新的人类光属性。利用更新后的透射图值恢复图像的亮度,生成去暗图像。最后,进行去噪处理,得到视觉质量最好的输出图像。在ExDark数据集上进行的仿真表明,与最先进的方法相比,所提出的方法具有优越的主观和客观性能。
{"title":"Low-light Color Image Enhancement based on Dark Channel Prior with Retinex Model","authors":"Sameena, E. Sreenivasulu","doi":"10.1109/STCR55312.2022.10009364","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009364","url":null,"abstract":"Low light image enhancement plays the crucial role in night vision applications, and road monitoring systems of artificial intelligence assisted vehicles. But the conventional methods are unable to remove the darkness from source images and resulted in poor visibility performance. Thus, this article proposed an advanced low light image enhancement approach using dark channel prior (DCP). Initially, light reflection (retinex) angles are identified and red channel estimation was used to restore light direction attention. Further, DCP is used to identify the background darkness region with light illumination properties. Then, new anthropic light properties were generated by using transmission map estimation and refinement. Further, image light radiance is recovered by using this updated transmission map values, which generates darkness removed image. Finally, denoising operation is performed to get the best visual quality output image. The simulations conducted on ExDark dataset shows that the proposed method resulted in superior subjective and objective performance as compared to state of art approaches.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127111924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Processing of Wisconsin Breast Cancer Data using Ebola Optimization Algorithm with Mixture Kernel SVM 混合核支持向量机的埃博拉优化算法处理威斯康星州乳腺癌数据
Pub Date : 2022-12-10 DOI: 10.1109/STCR55312.2022.10009386
Sannasi Chakravarthy S R, H. Rajaguru, S. Chidambaram
Being a deadly disease, breast cancer is becoming the more progressive one in providing higher mortality for females around the world. Thereby, the need for an appropriate strategy is always required for earlier breast cancer diagnosis. The physicians utilize the Computer-Aided Diagnosis (CAD) tool for effective and tireless detection of such cancers. In this regard, the work is intended to design a CAD system for breast cancer diagnosis in a timely manner. The implementation starts with the use of Wisconsin Breast Cancer dataset. After performing preprocessing and visual analysis of the input dataset, feature selection is performed to improve the efficiency of the CAD system. This can be done by using the recently evolved Ebola Optimization Algorithm (EOA). This algorithm is based on an effective approach used in the propagation of the Ebola virus among individuals. After feature selection, the dominant features are then classified with the aid of a mixture Kernel Support Vector Machine (mK-SVM) algorithm. Additionally, the work utilized the Linear SVM, and KNN algorithms for the experimental analysis and comparison. As a result, the mK-SVM together with EOA provides maximum accuracy of 97.19% in classifying the input as either benign severity or malignant case.
作为一种致命的疾病,乳腺癌正在成为世界各地女性死亡率更高的一种疾病。因此,需要一个适当的策略,总是需要早期乳腺癌诊断。医生利用计算机辅助诊断(CAD)工具对此类癌症进行有效和不懈的检测。为此,本工作旨在及时设计一个用于乳腺癌诊断的CAD系统。实现从使用威斯康星乳腺癌数据集开始。在对输入数据集进行预处理和可视化分析后,进行特征选择,以提高CAD系统的效率。这可以通过使用最近发展的埃博拉优化算法(EOA)来完成。该算法基于埃博拉病毒在个体间传播时使用的有效方法。特征选择完成后,利用混合核支持向量机(mK-SVM)算法对优势特征进行分类。此外,本文利用线性支持向量机和KNN算法进行实验分析和比较。结果表明,mK-SVM结合EOA对输入的良性严重程度和恶性程度进行分类,准确率最高可达97.19%。
{"title":"Processing of Wisconsin Breast Cancer Data using Ebola Optimization Algorithm with Mixture Kernel SVM","authors":"Sannasi Chakravarthy S R, H. Rajaguru, S. Chidambaram","doi":"10.1109/STCR55312.2022.10009386","DOIUrl":"https://doi.org/10.1109/STCR55312.2022.10009386","url":null,"abstract":"Being a deadly disease, breast cancer is becoming the more progressive one in providing higher mortality for females around the world. Thereby, the need for an appropriate strategy is always required for earlier breast cancer diagnosis. The physicians utilize the Computer-Aided Diagnosis (CAD) tool for effective and tireless detection of such cancers. In this regard, the work is intended to design a CAD system for breast cancer diagnosis in a timely manner. The implementation starts with the use of Wisconsin Breast Cancer dataset. After performing preprocessing and visual analysis of the input dataset, feature selection is performed to improve the efficiency of the CAD system. This can be done by using the recently evolved Ebola Optimization Algorithm (EOA). This algorithm is based on an effective approach used in the propagation of the Ebola virus among individuals. After feature selection, the dominant features are then classified with the aid of a mixture Kernel Support Vector Machine (mK-SVM) algorithm. Additionally, the work utilized the Linear SVM, and KNN algorithms for the experimental analysis and comparison. As a result, the mK-SVM together with EOA provides maximum accuracy of 97.19% in classifying the input as either benign severity or malignant case.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126610711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 Smart Technologies, Communication and Robotics (STCR)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1