Pub Date : 2023-05-18DOI: 10.1109/ACCESS57397.2023.10199733
Tejaas Solanki, Kundan Patel, Swanand Pande, Anant V. Nimkar
With every industry finding better applications of blockchain, it has become increasingly essential to explore its potential. Security and immutability are some of the properties of blockchain that make it very popular among companies moving to decentralized systems. An architecture for user identity management system based on blockchain that backs authentication has been proposed in this paper. A simulation justifies the use of blockchain for identity purposes. This provides a way to use this system in many industries such as storage of medical health records, a means to provide SSO ability, etc. Basic authentication of a user can take place in matter of seconds and the best part of such a system is that a user is in control of their identity.
{"title":"BlockID: Blockchain based Digital ID and Authentication System for Privacy Improvement","authors":"Tejaas Solanki, Kundan Patel, Swanand Pande, Anant V. Nimkar","doi":"10.1109/ACCESS57397.2023.10199733","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10199733","url":null,"abstract":"With every industry finding better applications of blockchain, it has become increasingly essential to explore its potential. Security and immutability are some of the properties of blockchain that make it very popular among companies moving to decentralized systems. An architecture for user identity management system based on blockchain that backs authentication has been proposed in this paper. A simulation justifies the use of blockchain for identity purposes. This provides a way to use this system in many industries such as storage of medical health records, a means to provide SSO ability, etc. Basic authentication of a user can take place in matter of seconds and the best part of such a system is that a user is in control of their identity.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124610037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-18DOI: 10.1109/ACCESS57397.2023.10200701
Vishnu Narayanan A, Rubell Marion Lincy G, Parvathy Gopakumar
Hybrid Electric Vehicles (HEV) (Self-charging Hybrid Vehicles) have been exemplified as the timely, practical, balanced solution for fuel-efficiency and eco-friendly environment. Considering the design perspective of the powertrain, the different strategies employed for Energy Management have depicted vast improvements in the energy efficiency of the hybrid powertrain models. With companies like deep-mind promoting Reinforcement Learning (RL) with the human-level efficiency to task multi-games, RL-based algorithms have been arduously researched to develop Energy Management System (EMS) owing to the capability to self-learn interacting with any complex environment by the return in rewards for each action. The recent research proved this to be on a larger efficient scale compared to the predefined algorithms. This article reviews the different powertrain models and their working along with some basic RL algorithms for any alterations from the pre-existing models to improve the efficiency and develop the easiness of the management system. Ample importance is given to the classification of EMS, and the primary EMS created using RL in this review. A model for the EMS is also discussed along with the results. The future scope of work is also discussed.
{"title":"Reinforcement Learning based Energy Management system for Hybrid Electric Vehicles","authors":"Vishnu Narayanan A, Rubell Marion Lincy G, Parvathy Gopakumar","doi":"10.1109/ACCESS57397.2023.10200701","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10200701","url":null,"abstract":"Hybrid Electric Vehicles (HEV) (Self-charging Hybrid Vehicles) have been exemplified as the timely, practical, balanced solution for fuel-efficiency and eco-friendly environment. Considering the design perspective of the powertrain, the different strategies employed for Energy Management have depicted vast improvements in the energy efficiency of the hybrid powertrain models. With companies like deep-mind promoting Reinforcement Learning (RL) with the human-level efficiency to task multi-games, RL-based algorithms have been arduously researched to develop Energy Management System (EMS) owing to the capability to self-learn interacting with any complex environment by the return in rewards for each action. The recent research proved this to be on a larger efficient scale compared to the predefined algorithms. This article reviews the different powertrain models and their working along with some basic RL algorithms for any alterations from the pre-existing models to improve the efficiency and develop the easiness of the management system. Ample importance is given to the classification of EMS, and the primary EMS created using RL in this review. A model for the EMS is also discussed along with the results. The future scope of work is also discussed.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"1 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120997656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-18DOI: 10.1109/ACCESS57397.2023.10201006
S. Natarajan, V. Govindaraj, Pallikonda Rajasekaran Murugan, Yudong Zhang, Arunprasath Thiyagarajan, Kiruthika Uma
Many medical image-based diagnostics, particularly the diagnosis of brain tumours in Magnetic Resonance Imaging (MRI), heavily rely on multi-region segmentation. This work's major objective is to improve the multi-region detection performance by combining a modified Fuzzy C-Means (FCM) with a self-accommodative JAYA (SAJAYA) algorithm. Due to its capacity to choose the number of cluster heads in the FCM stage and population suitability in the optimization stage, this technique is more successful and considerably facilitates the precise MR brain image segmentation. To achieve the best performance, SAJAYA is employed to optimize segmentation variables and reduce the overall computation time and complexity. The proposed algorithm segments the different informative sections, such as cerebrospinal fluid, grey matter, and white matter, which will be most helpful to investigate and characterize the tumour. The experiment's findings show that the suggested algorithm is successful in terms of sensitivity, specificity, accuracy and other benchmark metrics.
{"title":"Tumour region detection in MR brain images using MFCM based segmentation and Self Accommodative JAYA based optimization","authors":"S. Natarajan, V. Govindaraj, Pallikonda Rajasekaran Murugan, Yudong Zhang, Arunprasath Thiyagarajan, Kiruthika Uma","doi":"10.1109/ACCESS57397.2023.10201006","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10201006","url":null,"abstract":"Many medical image-based diagnostics, particularly the diagnosis of brain tumours in Magnetic Resonance Imaging (MRI), heavily rely on multi-region segmentation. This work's major objective is to improve the multi-region detection performance by combining a modified Fuzzy C-Means (FCM) with a self-accommodative JAYA (SAJAYA) algorithm. Due to its capacity to choose the number of cluster heads in the FCM stage and population suitability in the optimization stage, this technique is more successful and considerably facilitates the precise MR brain image segmentation. To achieve the best performance, SAJAYA is employed to optimize segmentation variables and reduce the overall computation time and complexity. The proposed algorithm segments the different informative sections, such as cerebrospinal fluid, grey matter, and white matter, which will be most helpful to investigate and characterize the tumour. The experiment's findings show that the suggested algorithm is successful in terms of sensitivity, specificity, accuracy and other benchmark metrics.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114425525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-18DOI: 10.1109/ACCESS57397.2023.10201106
Asha J. Vithayathil, A. Sreekumar
In recent years, chaos based cryptography has become a prevalent and efficient way to secure digital images because of the similarities between chaotic properties and the traits needed for encryption. This paper proposes an image encryption algorithm combining a chaotic map, Josephus problem, cyclic shift operation, and XOR operation. The proposed encryption procedure follows the traditional permutation-substitution or confusion-diffusion structure. Here, the Henon map and the novel key generation phase generate image-sensitive chaotic streams, which are used for permutation and diffusion. The aperiodic Josephus permutation and bit-level chaotic cycle shift method accomplish the permutation stage by altering the position and value of each pixel. And this proposed permutation thwarts statistical cryptanalysis by dropping the correlation between neighboring pixels to approximately equal zero. The substitution stage is achieved with modulus and XOR operations on the scrambled image and the chaotic matrix. We compare the proposed method with other recent image encryption algorithms in the simulation experiment and security analysis, and the results confirm that the proposed method has better performance and higher security.
{"title":"Image Encryption Through Aperiodic Josephus Permutation And Novel Cyclic Shift Operation","authors":"Asha J. Vithayathil, A. Sreekumar","doi":"10.1109/ACCESS57397.2023.10201106","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10201106","url":null,"abstract":"In recent years, chaos based cryptography has become a prevalent and efficient way to secure digital images because of the similarities between chaotic properties and the traits needed for encryption. This paper proposes an image encryption algorithm combining a chaotic map, Josephus problem, cyclic shift operation, and XOR operation. The proposed encryption procedure follows the traditional permutation-substitution or confusion-diffusion structure. Here, the Henon map and the novel key generation phase generate image-sensitive chaotic streams, which are used for permutation and diffusion. The aperiodic Josephus permutation and bit-level chaotic cycle shift method accomplish the permutation stage by altering the position and value of each pixel. And this proposed permutation thwarts statistical cryptanalysis by dropping the correlation between neighboring pixels to approximately equal zero. The substitution stage is achieved with modulus and XOR operations on the scrambled image and the chaotic matrix. We compare the proposed method with other recent image encryption algorithms in the simulation experiment and security analysis, and the results confirm that the proposed method has better performance and higher security.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129827731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-18DOI: 10.1109/ACCESS57397.2023.10199210
Vinay Venkatesh
An estimated 19,223 people lost their lives due to gun violence in 2020. ArmVision prevents arm related crimes before they occur and brings quicker attention to them if they do with its efficient notification system. Its wide range of applicability expresses a bright future for its development. ArmVision uses a complex machine learning (ML) algorithm called You Only Look Once (YOLO) and Convolutional Neural Networks (CNNs) to optimize its performance.
据估计,2020年有19223人因枪支暴力而丧生。ArmVision可以在武器犯罪发生之前进行预防,如果使用其高效的通知系统,可以更快地引起人们的注意。其广泛的适用性表明其发展前景广阔。ArmVision使用一种名为You Only Look Once (YOLO)的复杂机器学习(ML)算法和卷积神经网络(cnn)来优化其性能。
{"title":"ArmVision: An Approach to Improve Police Officers Response Times to Gun Violence and Put a Stop to Armed Crimes Before They Occur","authors":"Vinay Venkatesh","doi":"10.1109/ACCESS57397.2023.10199210","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10199210","url":null,"abstract":"An estimated 19,223 people lost their lives due to gun violence in 2020. ArmVision prevents arm related crimes before they occur and brings quicker attention to them if they do with its efficient notification system. Its wide range of applicability expresses a bright future for its development. ArmVision uses a complex machine learning (ML) algorithm called You Only Look Once (YOLO) and Convolutional Neural Networks (CNNs) to optimize its performance.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121833261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-18DOI: 10.1109/ACCESS57397.2023.10199858
J. Sravanthi, B. V. Subbayamma, Waseem Sultana, Sriram Parabrahmachari, V. G. Krishnan, Yadavalli S S Sriramam
The optimization of energy conservation and the span of the system are the important obstacles to establishing and managing the function of wireless sensor networks. Grouping is an efficient strategy for modifying the load, synchronizing the structure with the associated order, and lengthening the system's life. In a cluster-based system, hot spots arise because the group leader that is closer the sink soon runs out of energy. To resolve this challenge, numerous uneven grouping strategies have been suggested. These strategies have the limitation of overburdening the group leader with endpoints that enter the identical cluster. Hence, in order to strengthen the functionality of a group, we provide a strategy in this research called fuzzy logic - based imbalanced grouping. Generated statistics is used to examine the intended study. The recommended strategy is contrasted with two existing heuristics: LEACH, which employs an analogous grouping strategy, and EAUCF, which employs an asymmetrical grouping strategy. The MATLAB simulation findings illustrate that the recommended strategy performs superior than the other two strategies.
{"title":"Enhancement of Energy Efficiency using Improved Energy Efficient Routing Protocol in Wireless Sensor Networks for IoT Applications","authors":"J. Sravanthi, B. V. Subbayamma, Waseem Sultana, Sriram Parabrahmachari, V. G. Krishnan, Yadavalli S S Sriramam","doi":"10.1109/ACCESS57397.2023.10199858","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10199858","url":null,"abstract":"The optimization of energy conservation and the span of the system are the important obstacles to establishing and managing the function of wireless sensor networks. Grouping is an efficient strategy for modifying the load, synchronizing the structure with the associated order, and lengthening the system's life. In a cluster-based system, hot spots arise because the group leader that is closer the sink soon runs out of energy. To resolve this challenge, numerous uneven grouping strategies have been suggested. These strategies have the limitation of overburdening the group leader with endpoints that enter the identical cluster. Hence, in order to strengthen the functionality of a group, we provide a strategy in this research called fuzzy logic - based imbalanced grouping. Generated statistics is used to examine the intended study. The recommended strategy is contrasted with two existing heuristics: LEACH, which employs an analogous grouping strategy, and EAUCF, which employs an asymmetrical grouping strategy. The MATLAB simulation findings illustrate that the recommended strategy performs superior than the other two strategies.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123078096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-18DOI: 10.1109/ACCESS57397.2023.10199720
Jowa Yangchin, N. Marchang
Mobile crowd sensing is a technique that allows collection of real-time data from a large number of mobile users who carry a mobile device with sensing capabilities. It is widely used for data sensing applications, such as traffic monitoring, environmental monitoring, health and fitness, retail marketing, and emergency response. It requires individual users to perform the sensing task based on the location of the task and the user. Ensuring privacy and security of individuals and accuracy and reliability of the data collected are primary challenges in a mobile crowd sensing system. To motivate more users to collect data, it is required for the system to be built in a manner that each user is rewarded for the task done while maintaining the budget balance. As users are of heterogeneous nature, they must be rewarded for the task done based on their own true valuation of the task. The reverse auction method for mobile crowdsensing is becoming one of the widely used incentive mechanism for its choice to the mobile users, who act as the participating workers, for fixing the price for which they want to sell the sensed data. For a reverse auction system to work, it is required that there are enough users who are willing to bid in an auction round. Maintaining a participant pool with enough competition while keeping the bid values near to true values is a key challenge to be addressed. Failing to maintain enough participants can result in higher bid prices with each round and hence increasing total reward value to be distributed. This may lead to incentive explosion where the bid price is too high for the available budget. In this work, we propose a novel approach of retaining users by considering the frequency of winning and participation of users. This mechanism is built on top of RADP-VPC which is reverse auction mechanism based on reverse- auction with dynamic pricing with virtual participation credit. The experimental results show that the proposed approach using participation history for each user performs better than RADP-VPC in terms of retaining users and incentive explosion.
{"title":"Incentive Mechanism for Mobile Crowd Sensing Using Reverse Auction Dynamic Pricing and Recent History","authors":"Jowa Yangchin, N. Marchang","doi":"10.1109/ACCESS57397.2023.10199720","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10199720","url":null,"abstract":"Mobile crowd sensing is a technique that allows collection of real-time data from a large number of mobile users who carry a mobile device with sensing capabilities. It is widely used for data sensing applications, such as traffic monitoring, environmental monitoring, health and fitness, retail marketing, and emergency response. It requires individual users to perform the sensing task based on the location of the task and the user. Ensuring privacy and security of individuals and accuracy and reliability of the data collected are primary challenges in a mobile crowd sensing system. To motivate more users to collect data, it is required for the system to be built in a manner that each user is rewarded for the task done while maintaining the budget balance. As users are of heterogeneous nature, they must be rewarded for the task done based on their own true valuation of the task. The reverse auction method for mobile crowdsensing is becoming one of the widely used incentive mechanism for its choice to the mobile users, who act as the participating workers, for fixing the price for which they want to sell the sensed data. For a reverse auction system to work, it is required that there are enough users who are willing to bid in an auction round. Maintaining a participant pool with enough competition while keeping the bid values near to true values is a key challenge to be addressed. Failing to maintain enough participants can result in higher bid prices with each round and hence increasing total reward value to be distributed. This may lead to incentive explosion where the bid price is too high for the available budget. In this work, we propose a novel approach of retaining users by considering the frequency of winning and participation of users. This mechanism is built on top of RADP-VPC which is reverse auction mechanism based on reverse- auction with dynamic pricing with virtual participation credit. The experimental results show that the proposed approach using participation history for each user performs better than RADP-VPC in terms of retaining users and incentive explosion.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124665850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-18DOI: 10.1109/ACCESS57397.2023.10201167
K. Prasad, V. Chandratre, M. Sukhwani, R. Shinde
this paper describes the aspects of the multi-channel, compact data acquisition systems (DAQs), developed to characterize the front-end electronics (FEE) of the resistive plate chamber detectors (RPCs) being used in India-based neutrino observatory (INO) experiment. The number of RPCs and FEE boards required in the experiment are 29000 and 464000 respectively. It is required to characterize the FEEs along with RPC detectors before the actual deployment in the experiment. The detector parameters that are to be measured for this characterization are strip (noise) rate, muon detection efficiency, and time resolution. Usually, commercial, rack mount level translators, scalars and time-to-digital converters (TDC) are being used to measure these parameters. In the DAQ system presented here, all these functionalities have been integrated in a single compact module thereby resulting in a low cost, multichannel, and compact DAQ system. This paper describes in detail the developmental aspects of 128-channel DAQ system built using Xilinx Spartan-6 FPGAs, ARM Cortex-M4 microcontroller and in-house developed ASIC and FPGA based TDCs. The DAQ system has Ethernet interface and USB interface for data transfer. The system is supported by detailed data analysis software to monitor and measure the parameters in real time. The DAQ is tested with different configurations of RPCs and FEEs. The strip rates of the order of 30 - 200 counts per seconds (CPS), detector efficiency of greater than 90% and timing resolution of 2.4 ns to 2.7 ns are measured using these DAQs.
{"title":"Multi-channel, compact DAQ system with inbuilt Time-to-digital converters","authors":"K. Prasad, V. Chandratre, M. Sukhwani, R. Shinde","doi":"10.1109/ACCESS57397.2023.10201167","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10201167","url":null,"abstract":"this paper describes the aspects of the multi-channel, compact data acquisition systems (DAQs), developed to characterize the front-end electronics (FEE) of the resistive plate chamber detectors (RPCs) being used in India-based neutrino observatory (INO) experiment. The number of RPCs and FEE boards required in the experiment are 29000 and 464000 respectively. It is required to characterize the FEEs along with RPC detectors before the actual deployment in the experiment. The detector parameters that are to be measured for this characterization are strip (noise) rate, muon detection efficiency, and time resolution. Usually, commercial, rack mount level translators, scalars and time-to-digital converters (TDC) are being used to measure these parameters. In the DAQ system presented here, all these functionalities have been integrated in a single compact module thereby resulting in a low cost, multichannel, and compact DAQ system. This paper describes in detail the developmental aspects of 128-channel DAQ system built using Xilinx Spartan-6 FPGAs, ARM Cortex-M4 microcontroller and in-house developed ASIC and FPGA based TDCs. The DAQ system has Ethernet interface and USB interface for data transfer. The system is supported by detailed data analysis software to monitor and measure the parameters in real time. The DAQ is tested with different configurations of RPCs and FEEs. The strip rates of the order of 30 - 200 counts per seconds (CPS), detector efficiency of greater than 90% and timing resolution of 2.4 ns to 2.7 ns are measured using these DAQs.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121391969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-18DOI: 10.1109/ACCESS57397.2023.10200199
Subha Thomas, R. Sudarmani
The leading cause of cancer related mortality in both kids and adults is brain tumor. Through the examination of the abnormalities of the tumor's tissues and cells, a tumor may be divided into many stages. The acute risk of tumor growth and spread is provided by this stage. Biopsy can be used to assess the tumor grade. It should be mentioned that tumor grading differs from cancer stage classification. Due to their high complexity and wide variation, brain tumor types are particularly difficult to diagnose with great accuracy. This survey starts with the review of 25 papers on brain tumor classification. The varied models used in the papers are analyzed, which includes methods for segmentation, classification and optimization. The analysis on varied metrics is analyzed and their maximal performances are also examined. Finally, chronological review is performed along with existing challenges.
{"title":"Brain Tumor Classification using MRI Image -A Survey","authors":"Subha Thomas, R. Sudarmani","doi":"10.1109/ACCESS57397.2023.10200199","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10200199","url":null,"abstract":"The leading cause of cancer related mortality in both kids and adults is brain tumor. Through the examination of the abnormalities of the tumor's tissues and cells, a tumor may be divided into many stages. The acute risk of tumor growth and spread is provided by this stage. Biopsy can be used to assess the tumor grade. It should be mentioned that tumor grading differs from cancer stage classification. Due to their high complexity and wide variation, brain tumor types are particularly difficult to diagnose with great accuracy. This survey starts with the review of 25 papers on brain tumor classification. The varied models used in the papers are analyzed, which includes methods for segmentation, classification and optimization. The analysis on varied metrics is analyzed and their maximal performances are also examined. Finally, chronological review is performed along with existing challenges.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132758375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-18DOI: 10.1109/ACCESS57397.2023.10200895
Biya Kurian, Jerom Regi, Dennis John, Hari P, Therese Yamuna Mahesh
In recent years, there has been an increase in the use of IoT devices for home automation, shopping malls, and other public places. However, for individuals who are mute or bedridden, accessing these devices can be difficult, especially when they are voice-activated. To address this issue, hand gesture recognition technology has been developed to allow individuals to control these devices through simple hand movements. Image processing and pattern recognition are crucial for accurately detecting these hand gestures, and platforms such as Open CV, Python, PyCharm, and Media Pipe are commonly used in software development to achieve this. This technology has the potential to help people with physical, sensory, or intellectual disabilities to participate fully in all activities in society and enjoy equal opportunities. By using hand gestures to communicate with IoT devices, individuals who are deaf can also benefit from this technology. Ultimately, this technology has the potential to create a human-computer interaction that is accessible to all, making it a valuable addition to the field of assistive technology. Furthermore, hand gesture recognition technology is an excellent example of the potential of IoT devices to facilitate a more connected and automated world. However, it is important to note that with any new technology, there are also concerns around data privacy and security. As such, it is essential that developers prioritize ethical considerations and robust security protocols when designing these systems. Moreover, hand gesture recognition technology can be further improved through the use of artificial intelligence and machine learning. These technologies can help improve the accuracy of the recognition system and provide a more personalized experience for users. This system is highly reliable and user-friendly, and does not require any physical contact, which makes it highly suitable for disabled people. Furthermore, the development of new sensor technologies can also help increase the reliability and efficiency of the hand gesture recognition system. Overall, the development of hand gesture recognition technology is an exciting and innovative area of research that has the potential to improve the lives of many individuals, particularly those with physical or sensory disabilities. With continued advancements in technology, it can expect to see more sophisticated and accessible hand gesture recognition systems that will help create a more inclusive and accessible society.
{"title":"Visual Gesture-Based Home Automation","authors":"Biya Kurian, Jerom Regi, Dennis John, Hari P, Therese Yamuna Mahesh","doi":"10.1109/ACCESS57397.2023.10200895","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10200895","url":null,"abstract":"In recent years, there has been an increase in the use of IoT devices for home automation, shopping malls, and other public places. However, for individuals who are mute or bedridden, accessing these devices can be difficult, especially when they are voice-activated. To address this issue, hand gesture recognition technology has been developed to allow individuals to control these devices through simple hand movements. Image processing and pattern recognition are crucial for accurately detecting these hand gestures, and platforms such as Open CV, Python, PyCharm, and Media Pipe are commonly used in software development to achieve this. This technology has the potential to help people with physical, sensory, or intellectual disabilities to participate fully in all activities in society and enjoy equal opportunities. By using hand gestures to communicate with IoT devices, individuals who are deaf can also benefit from this technology. Ultimately, this technology has the potential to create a human-computer interaction that is accessible to all, making it a valuable addition to the field of assistive technology. Furthermore, hand gesture recognition technology is an excellent example of the potential of IoT devices to facilitate a more connected and automated world. However, it is important to note that with any new technology, there are also concerns around data privacy and security. As such, it is essential that developers prioritize ethical considerations and robust security protocols when designing these systems. Moreover, hand gesture recognition technology can be further improved through the use of artificial intelligence and machine learning. These technologies can help improve the accuracy of the recognition system and provide a more personalized experience for users. This system is highly reliable and user-friendly, and does not require any physical contact, which makes it highly suitable for disabled people. Furthermore, the development of new sensor technologies can also help increase the reliability and efficiency of the hand gesture recognition system. Overall, the development of hand gesture recognition technology is an exciting and innovative area of research that has the potential to improve the lives of many individuals, particularly those with physical or sensory disabilities. With continued advancements in technology, it can expect to see more sophisticated and accessible hand gesture recognition systems that will help create a more inclusive and accessible society.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}