首页 > 最新文献

2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)最新文献

英文 中文
Robust Artificial Bee Colony Optimization Based Classifier for Prediction of Autism Spectrum Disorder 基于鲁棒人工蜂群优化的分类器预测自闭症谱系障碍
Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753510
S. Malathi, D. Kannan
Autism Spectrum Disorder (ASD) is a significant type of neurological disorder that affects the ability of person's to connect socially and communicate with others. Repetitive and limited patterns of conduct are also a part of ASD. The expenses of autism can spike while a diagnosis is being sought and when therapies are being delivered, but many of these expenditures are ongoing and will stay with a person for the rest of their lives. In order to get better outcomes, machine learning and optimization have extended across a wide variety of professions and specialties. In this paper, an optimization-based classification algorithm namely Robust Artificial Bee Colony Optimization based Classifier (RABCOC) is proposed for precise detection of ASD. RABCOC performs optimization before classification is done. For performing classification, this research work makes use of enhanced decision tree based gradient boosting method. RABCOC is evaluated with three different ASD screening dataset with the metrics Accuracy and F - Measure. Results achieved by RABCOC are compared with existing classifiers and it is found that RABCOC has better performance than existing classifiers towards prediction of ASD.
自闭症谱系障碍(ASD)是一种重要的神经系统疾病,它影响人们与社会联系和与他人沟通的能力。重复和有限的行为模式也是自闭症谱系障碍的一部分。在寻求诊断和提供治疗的过程中,自闭症的费用可能会飙升,但这些费用中的许多是持续的,并将伴随一个人的余生。为了获得更好的结果,机器学习和优化已经扩展到各种各样的专业和专业。本文提出了一种基于优化的分类算法——鲁棒人工蜂群优化分类器(Robust Artificial Bee Colony Optimization based Classifier, RABCOC),用于ASD的精确检测。RABCOC在分类之前进行优化。为了进行分类,本研究使用了基于增强决策树的梯度增强方法。RABCOC用三种不同的ASD筛选数据集进行评估,指标为准确性和F - Measure。将RABCOC的结果与现有的分类器进行比较,发现RABCOC在预测ASD方面比现有的分类器有更好的性能。
{"title":"Robust Artificial Bee Colony Optimization Based Classifier for Prediction of Autism Spectrum Disorder","authors":"S. Malathi, D. Kannan","doi":"10.1109/ICACTA54488.2022.9753510","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753510","url":null,"abstract":"Autism Spectrum Disorder (ASD) is a significant type of neurological disorder that affects the ability of person's to connect socially and communicate with others. Repetitive and limited patterns of conduct are also a part of ASD. The expenses of autism can spike while a diagnosis is being sought and when therapies are being delivered, but many of these expenditures are ongoing and will stay with a person for the rest of their lives. In order to get better outcomes, machine learning and optimization have extended across a wide variety of professions and specialties. In this paper, an optimization-based classification algorithm namely Robust Artificial Bee Colony Optimization based Classifier (RABCOC) is proposed for precise detection of ASD. RABCOC performs optimization before classification is done. For performing classification, this research work makes use of enhanced decision tree based gradient boosting method. RABCOC is evaluated with three different ASD screening dataset with the metrics Accuracy and F - Measure. Results achieved by RABCOC are compared with existing classifiers and it is found that RABCOC has better performance than existing classifiers towards prediction of ASD.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Implementation of MIMO and OFDM Based Visible Light Communication System for Indoor Environment 基于MIMO和OFDM的室内可见光通信系统的实现
Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9752992
K. M, S. K, P. D
MIMO systems that use multiple LED light sources and photo detectors are attractive for visible communication lights proportion to their acquired capacitive and the number of parallel single input single output channel. The MIMO VLC system overcomes the capacity limitations caused by the limited LED modulate bandwidth by using the high SNR of the SISO channel provided according to general lighting requirements. This paper compares Enhanced Optical OFDM (EOOFDM), that's uses as an excessive-bandwidth performance approach, with 3 famous OFDM (Orthogonal Frequency Division Multiplexing) methods. The proposed mechanism would increase the information switch price through 1/8 instances as compared to different traditional structures, while preserving the identical information level with the ideal approach, the simulation outcomes display that the Eb/No of the proposed machine has expanded through as a minimum 0.65dB. With the ensuing outcomes, EO-OFDM can offer better information cost while OFDM above the channels with confined frequency bands. The simulation outcomes display that this approach can extensively minimize PAPR. At the same time, beneath the LED's non-linear restriction and confined aggressive range, the general achievement of this results is higher above the different competing solutions
使用多个LED光源和光电探测器的MIMO系统对可见光通信灯具有吸引力,其获得的电容和并行单输入单输出通道的数量成比例。MIMO VLC系统利用根据一般照明要求提供的SISO通道的高信噪比,克服了LED调制带宽有限带来的容量限制。本文将增强型光OFDM (EOOFDM)与三种著名的正交频分复用(OFDM)方法进行了比较。与不同的传统结构相比,所提出的机制将使信息交换价格增加1/8个实例,同时保持与理想方法相同的信息水平,仿真结果显示,所提出的机器的Eb/No已经扩展了至少0.65dB。由此得出EO-OFDM可以提供更好的信息成本,而OFDM在受限频带的信道之上。仿真结果表明,该方法可以极大地减小PAPR。同时,在LED的非线性限制和有限的攻击范围下,该结果的总体成就高于不同的竞争解决方案
{"title":"An Implementation of MIMO and OFDM Based Visible Light Communication System for Indoor Environment","authors":"K. M, S. K, P. D","doi":"10.1109/ICACTA54488.2022.9752992","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752992","url":null,"abstract":"MIMO systems that use multiple LED light sources and photo detectors are attractive for visible communication lights proportion to their acquired capacitive and the number of parallel single input single output channel. The MIMO VLC system overcomes the capacity limitations caused by the limited LED modulate bandwidth by using the high SNR of the SISO channel provided according to general lighting requirements. This paper compares Enhanced Optical OFDM (EOOFDM), that's uses as an excessive-bandwidth performance approach, with 3 famous OFDM (Orthogonal Frequency Division Multiplexing) methods. The proposed mechanism would increase the information switch price through 1/8 instances as compared to different traditional structures, while preserving the identical information level with the ideal approach, the simulation outcomes display that the Eb/No of the proposed machine has expanded through as a minimum 0.65dB. With the ensuing outcomes, EO-OFDM can offer better information cost while OFDM above the channels with confined frequency bands. The simulation outcomes display that this approach can extensively minimize PAPR. At the same time, beneath the LED's non-linear restriction and confined aggressive range, the general achievement of this results is higher above the different competing solutions","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117331217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Adaptive Priority Based IoT Communication in Wireless Network 基于自适应优先级的无线网络物联网通信设计
Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753550
R. Prabha, Senthil G. A, N. N. Saranya, A. M, K. Somasundaram, K. C
Heterogeneous wireless networks of the future must be able to satisfy ever increasing demands while also making the best use of available resources. Relaying IoT contact has emerged as a novel promising approach for improving coverage, lowering power consumption, and reducing the possibility of outages. Enabling cooperation among nodes significantly increases throughput in a multi-hop heterogeneous wireless system to provide optimal IoT communication. In recent IoT communication developments, relay selection has a significant impact on network performance. IoT communication, particularly in surveillance-based wireless networks, has a number of advantages over traditional direct communication, and relay selection is widely regarded as a smart way to increase capacity efficiency. The observation of numerous relying approaches prompted the creation of a better way to solve the imprecise nature of wireless networks by using adaptive priority-based relay selection decisions. In this work, a multi-hop terminal scenario, IoT communication to develop an efficient method for selecting a better relay in each IoT device, as well as to investigate the various user options for relay selection parameters. The results is experiments using NS2 (Network simulator) and implementation of Throughput, Packet Delivery Ratio (PDR) and End-to-End Delay performance are tested.
未来的异构无线网络必须能够满足不断增长的需求,同时也要充分利用可用资源。中继物联网接触已经成为一种新的有前途的方法,可以提高覆盖范围,降低功耗,减少停电的可能性。支持节点间的合作可以显著提高多跳异构无线系统的吞吐量,从而提供最佳的物联网通信。在最近的物联网通信发展中,中继选择对网络性能有重大影响。物联网通信,特别是在基于监视的无线网络中,与传统的直接通信相比具有许多优势,中继选择被广泛认为是提高容量效率的一种智能方法。对众多依赖方法的观察促使创造了一种更好的方法,通过使用基于优先级的自适应中继选择决策来解决无线网络的不精确性。在这项工作中,在多跳终端场景下,物联网通信开发了一种在每个物联网设备中选择更好的中继的有效方法,并研究了中继选择参数的各种用户选项。结果是使用NS2(网络模拟器)进行实验,并测试了吞吐量,分组投递率(PDR)和端到端延迟性能的实现。
{"title":"Design of Adaptive Priority Based IoT Communication in Wireless Network","authors":"R. Prabha, Senthil G. A, N. N. Saranya, A. M, K. Somasundaram, K. C","doi":"10.1109/ICACTA54488.2022.9753550","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753550","url":null,"abstract":"Heterogeneous wireless networks of the future must be able to satisfy ever increasing demands while also making the best use of available resources. Relaying IoT contact has emerged as a novel promising approach for improving coverage, lowering power consumption, and reducing the possibility of outages. Enabling cooperation among nodes significantly increases throughput in a multi-hop heterogeneous wireless system to provide optimal IoT communication. In recent IoT communication developments, relay selection has a significant impact on network performance. IoT communication, particularly in surveillance-based wireless networks, has a number of advantages over traditional direct communication, and relay selection is widely regarded as a smart way to increase capacity efficiency. The observation of numerous relying approaches prompted the creation of a better way to solve the imprecise nature of wireless networks by using adaptive priority-based relay selection decisions. In this work, a multi-hop terminal scenario, IoT communication to develop an efficient method for selecting a better relay in each IoT device, as well as to investigate the various user options for relay selection parameters. The results is experiments using NS2 (Network simulator) and implementation of Throughput, Packet Delivery Ratio (PDR) and End-to-End Delay performance are tested.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116184361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Child Safety Monitor in Cars Using Machine Learning 使用机器学习的汽车儿童安全监视器
Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9752789
A. M, S. M, Vallimaharajan G, Udhayanan C
This Child Safety Monitoring System transmits a warning to the parent or guardian if a child is left inadvertently in the car. The deaths related to children left in cars recur even though many systems thus far exist. This developed system aims at making a move in preventing these accidents. This system can classify images in real-time using Machine Learning, which consists of an Arduino Pro Mini board equipped with an IR Proximity Sensor to detect whether the car doors are closed or not. An own, unique dataset has been developed with eight individual children. The Haar-like feature algorithm is chosen to detect individual faces, which uses Haar features and Integral Images and helps at the stage of feature extraction. The Local Binary Pattern Histogram has been utilized for facial recognition. The suggested study shows that the LBPH algorithm is a more popular and accurate face recognition algorithm when compared to the Eigenfaces and Fisherfaces algorithm. This LBPH algorithm treats the result as a binary number and visualizes the final result as histograms. The detected child face is sent to the parent or guardian through e-mail only in case of the doors and windows being closed. The results imply that the LBPH algorithm approach generates promising performances for the task of detecting child-like objects, with the highest accuracy of 93.4% and an average accuracy of 89.27%.
这个儿童安全监控系统发送警告给父母或监护人,如果一个孩子被无意地留在车里。尽管目前存在许多系统,但与车内儿童有关的死亡事件仍在发生。这一开发系统的目的是在防止这些事故方面迈出一步。该系统可以利用机器学习对图像进行实时分类,该系统由Arduino Pro Mini板组成,配有红外接近传感器,用于检测车门是否关闭。一个自己的、独特的数据集已经由8个孩子组成。选择Haar类特征算法进行人脸检测,该算法利用Haar特征和积分图像,有助于特征提取阶段。局部二值模式直方图被用于人脸识别。研究表明,LBPH算法是一种比Eigenfaces和Fisherfaces算法更流行、更准确的人脸识别算法。这种LBPH算法将结果视为二进制数,并将最终结果可视化为直方图。只有在门窗关闭的情况下,检测到的孩子的脸才会通过电子邮件发送给父母或监护人。结果表明,LBPH算法方法在类儿童物体检测任务中具有良好的性能,最高准确率为93.4%,平均准确率为89.27%。
{"title":"Child Safety Monitor in Cars Using Machine Learning","authors":"A. M, S. M, Vallimaharajan G, Udhayanan C","doi":"10.1109/ICACTA54488.2022.9752789","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752789","url":null,"abstract":"This Child Safety Monitoring System transmits a warning to the parent or guardian if a child is left inadvertently in the car. The deaths related to children left in cars recur even though many systems thus far exist. This developed system aims at making a move in preventing these accidents. This system can classify images in real-time using Machine Learning, which consists of an Arduino Pro Mini board equipped with an IR Proximity Sensor to detect whether the car doors are closed or not. An own, unique dataset has been developed with eight individual children. The Haar-like feature algorithm is chosen to detect individual faces, which uses Haar features and Integral Images and helps at the stage of feature extraction. The Local Binary Pattern Histogram has been utilized for facial recognition. The suggested study shows that the LBPH algorithm is a more popular and accurate face recognition algorithm when compared to the Eigenfaces and Fisherfaces algorithm. This LBPH algorithm treats the result as a binary number and visualizes the final result as histograms. The detected child face is sent to the parent or guardian through e-mail only in case of the doors and windows being closed. The results imply that the LBPH algorithm approach generates promising performances for the task of detecting child-like objects, with the highest accuracy of 93.4% and an average accuracy of 89.27%.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Medical Healthcare System with Hybrid Block based Predictive models for Quality preserving in Medical Images using Machine Learning Techniques 使用机器学习技术在医学图像中保持质量的基于混合块预测模型的医疗保健系统
Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753355
M. Aruna, V. Arulkumar, M. Deepa, G. Latha
Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of a load of dealing with redundant data contents. This must be protected to prevent the theft of personal belongings, and privacy must be improved as well. Different research projects have been suggested to ensure the safe management of the information included within the data content. The security of current research projects, on the other hand, still needs improvement. As a result, this method has been suggested to address the security concerns associated with cloud computing. The primary goal of this study effort is to offer a safe environment for cloud users while also increasing the profit of cloud resource providers by managing and securely delivering data contents to the cloud users. The bulk of sectors, including business, finance, the military, and the healthcare industry, do not store data in cloud-based storage systems. This technique is used to attract these kinds of customers. Increasing public acceptance Medical researchers are drawn to cloud computing because it allows them to store their study material in a centralized location and distribute and access it in a more flexible manner. They were collected from numerous individuals who were being evaluated for medical care at the time. Scalable and Enhanced Key Aggregate Cryptosystem is a protected data protection method that provides highly effective security in the health care industry. This approach handles disagreements in the outflow of sensitive information and guarantees the data security deployment of a Cloud-based Intelligent Health Monitoring system for the parties involved in the dispute. Using the suggested method, the encrypted data format of medical and health-care prescriptions is recorded as it passes through the hands of patients and healthcare institutions. To increase the level of security, the double encryption method is used. During the encryption process, the Ciphertext ID is referred to as a class. The keyholder is a master secret key that aids in the retrieval of the secret keys of different kinds of monsters and creatures. The extracted key is transmitted and kept as a single aggregate for the benefit of the patient or client to facilitate decryption. Between the use of a key aggregation cryptosystem and double encryption method, the Cloud-based Intelligent Health Monitoring systems may establish a secure link with Healthcare Organizations and patients. As a result, when compared to prior methods, the results demonstrate that the study methodology achieves high levels of security in terms of confidentiality and integrity, as well as great scalability.
云技术是一种商业策略,旨在根据客户的需要为他们提供必要的资料。个人和云企业都接受了云存储服务,它已经成为使用最广泛的服务。行业将其数据外包到云存储空间,以减轻处理冗余数据内容的负担。这必须得到保护,以防止个人物品被盗,隐私也必须得到改善。为了确保数据内容中包含的信息的安全管理,提出了不同的研究项目。另一方面,当前研究项目的安全性仍有待提高。因此,建议使用这种方法来解决与云计算相关的安全问题。这项研究的主要目标是为云用户提供一个安全的环境,同时通过管理和安全地向云用户交付数据内容来增加云资源提供商的利润。包括商业、金融、军事和医疗保健行业在内的大部分行业都不会将数据存储在基于云的存储系统中。这种技巧就是用来吸引这类顾客的。医学研究人员被云计算所吸引,因为它允许他们将研究材料存储在一个集中的位置,并以更灵活的方式分发和访问这些材料。它们是从当时正在接受医疗评估的许多人身上收集的。可扩展和增强型密钥聚合密码系统是一种受保护的数据保护方法,可为医疗保健行业提供高效的安全性。这种方法处理敏感信息流出中的分歧,并保证为争议各方部署基于云的智能健康监测系统的数据安全。使用建议的方法,医疗和保健处方的加密数据格式在通过患者和保健机构时被记录下来。为了提高安全性,使用了双重加密方法。在加密过程中,密文ID被称为一个类。钥匙持有者是一个主秘密钥匙,帮助检索不同种类的怪物和生物的秘密钥匙。提取的密钥作为单个聚合进行传输和保存,以方便患者或客户端解密。在使用密钥聚合密码系统和双重加密方法之间,基于云的智能健康监测系统可以与医疗机构和患者建立安全链接。结果表明,与以前的方法相比,研究方法在保密性和完整性方面达到了很高的安全性,并且具有很大的可扩展性。
{"title":"Medical Healthcare System with Hybrid Block based Predictive models for Quality preserving in Medical Images using Machine Learning Techniques","authors":"M. Aruna, V. Arulkumar, M. Deepa, G. Latha","doi":"10.1109/ICACTA54488.2022.9753355","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753355","url":null,"abstract":"Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of a load of dealing with redundant data contents. This must be protected to prevent the theft of personal belongings, and privacy must be improved as well. Different research projects have been suggested to ensure the safe management of the information included within the data content. The security of current research projects, on the other hand, still needs improvement. As a result, this method has been suggested to address the security concerns associated with cloud computing. The primary goal of this study effort is to offer a safe environment for cloud users while also increasing the profit of cloud resource providers by managing and securely delivering data contents to the cloud users. The bulk of sectors, including business, finance, the military, and the healthcare industry, do not store data in cloud-based storage systems. This technique is used to attract these kinds of customers. Increasing public acceptance Medical researchers are drawn to cloud computing because it allows them to store their study material in a centralized location and distribute and access it in a more flexible manner. They were collected from numerous individuals who were being evaluated for medical care at the time. Scalable and Enhanced Key Aggregate Cryptosystem is a protected data protection method that provides highly effective security in the health care industry. This approach handles disagreements in the outflow of sensitive information and guarantees the data security deployment of a Cloud-based Intelligent Health Monitoring system for the parties involved in the dispute. Using the suggested method, the encrypted data format of medical and health-care prescriptions is recorded as it passes through the hands of patients and healthcare institutions. To increase the level of security, the double encryption method is used. During the encryption process, the Ciphertext ID is referred to as a class. The keyholder is a master secret key that aids in the retrieval of the secret keys of different kinds of monsters and creatures. The extracted key is transmitted and kept as a single aggregate for the benefit of the patient or client to facilitate decryption. Between the use of a key aggregation cryptosystem and double encryption method, the Cloud-based Intelligent Health Monitoring systems may establish a secure link with Healthcare Organizations and patients. As a result, when compared to prior methods, the results demonstrate that the study methodology achieves high levels of security in terms of confidentiality and integrity, as well as great scalability.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancing Secure Mutual Authentication in Mobile Fog Computing Environment 增强移动雾计算环境下的安全互认证
Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753559
D. D, J. R
Fog computing that extends the cloud nearby to the IoT devices. The advent of IoT technology generates a huge amount of data and is processed in the cloud, this increases the latency. Many time-sensitive applications are affected by delayed response. Fog computing solves the latency problem by processing near the data generating device. Because of the nature of fog computing mobility support, dynamic environment, geographic distribution, location awareness existing schemes do not provide better security. To address these issues, this paper provides mutual secure authentication between each entity in the fog like between the cloud and fog node, between fog node and gateway, between gateway and IoT device. This security mechanism improves the authentication in the fog network. Mobility-based authentication providing mechanism can be implemented with the MobFogSim mobility dataset that is collected from the Luxembourg traffic. Migration of the node is considered in mobility secure authentication.
雾计算将附近的云扩展到物联网设备。物联网技术的出现产生了大量的数据,并在云中处理,这增加了延迟。许多对时间敏感的应用程序都会受到延迟响应的影响。雾计算通过在数据生成设备附近进行处理来解决延迟问题。由于雾计算的性质支持移动性、动态环境、地理分布、位置感知,现有的方案不能提供更好的安全性。为了解决这些问题,本文提供了云与雾节点之间、雾节点与网关之间、网关与物联网设备之间等雾中各个实体之间的相互安全认证。这种安全机制提高了雾网络中的身份验证。基于移动性的身份验证提供机制可以通过从卢森堡流量收集的MobFogSim移动性数据集来实现。在移动性安全认证中考虑了节点的迁移。
{"title":"Enhancing Secure Mutual Authentication in Mobile Fog Computing Environment","authors":"D. D, J. R","doi":"10.1109/ICACTA54488.2022.9753559","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753559","url":null,"abstract":"Fog computing that extends the cloud nearby to the IoT devices. The advent of IoT technology generates a huge amount of data and is processed in the cloud, this increases the latency. Many time-sensitive applications are affected by delayed response. Fog computing solves the latency problem by processing near the data generating device. Because of the nature of fog computing mobility support, dynamic environment, geographic distribution, location awareness existing schemes do not provide better security. To address these issues, this paper provides mutual secure authentication between each entity in the fog like between the cloud and fog node, between fog node and gateway, between gateway and IoT device. This security mechanism improves the authentication in the fog network. Mobility-based authentication providing mechanism can be implemented with the MobFogSim mobility dataset that is collected from the Luxembourg traffic. Migration of the node is considered in mobility secure authentication.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Reality Based Escape Room 基于虚拟现实的密室逃生
Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753531
V. Kiruthika, M. Jagadeeswari, C.Sneha Prabha, V. Vaishnavi, H. Sreejaa
Escape rooms have become highly popular over the last few years which builds one's creativity by making puzzles or clues where the person can find the clues and reach a certain destination. The purpose of the escape room is to improve creative thinking and it also seems to be interesting for the users. Escape rooms can be designed in various interesting worlds in the field of gaming. The users can find the clues by navigating and solving riddles or puzzles that will unlock the doors and finally escape from the environment. These escape rooms use in virtual reality technology where the user can feel the real-time experience as he/she is there inside the environment. The user can also interact with the environment by picking objects, finding the clues, navigation, etc which provides real-time hands-on experience. Escape rooms can be designed as per the choice of the owner who creates the environment. The primary thing required for an escape room is a simple room and as per the assets used, it can be designed at a lower cost. If some changes/advancement is to be done inside the environment, the owner can directly change inside the project in unity software instead of completely changing the environment. The VR simulations can be viewed through many headsets namely HTC Vive, Oculus Rift, Oculus Quest, Google cardboard, etc. The Virtual Reality escape rooms can be created through various engines but this developed escape room is created using a unity engine. This VR escape room is designed for Oculus Quest 2 and it can be viewed through this VR headset.
在过去的几年里,密室逃生变得非常流行,它通过制造谜题或线索来培养一个人的创造力,人们可以找到线索并到达某个目的地。密室的目的是提高创造性思维,对用户来说似乎也很有趣。可以在游戏领域的各种有趣世界中设计逃生室。用户可以通过导航和解决谜语或谜题来找到线索,从而打开门并最终逃离环境。这些逃生室使用虚拟现实技术,用户可以感受到实时体验,因为他/她在那里的环境。用户还可以通过挑选对象、寻找线索、导航等方式与环境进行互动,从而提供实时的动手体验。逃生室可以根据创造环境的业主的选择来设计。逃生室的主要需求是一个简单的房间,根据所使用的资产,它可以以较低的成本设计。如果要在环境内部进行一些更改/改进,所有者可以直接在unity软件中更改项目内部,而不是完全改变环境。VR模拟可以通过许多头显观看,如HTC Vive, Oculus Rift, Oculus Quest,谷歌cardboard等。虚拟现实逃生室可以通过各种引擎创建,但这个开发的逃生室是使用统一引擎创建的。这个虚拟现实逃生室是为Oculus Quest 2设计的,可以通过这个虚拟现实头盔观看。
{"title":"Virtual Reality Based Escape Room","authors":"V. Kiruthika, M. Jagadeeswari, C.Sneha Prabha, V. Vaishnavi, H. Sreejaa","doi":"10.1109/ICACTA54488.2022.9753531","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753531","url":null,"abstract":"Escape rooms have become highly popular over the last few years which builds one's creativity by making puzzles or clues where the person can find the clues and reach a certain destination. The purpose of the escape room is to improve creative thinking and it also seems to be interesting for the users. Escape rooms can be designed in various interesting worlds in the field of gaming. The users can find the clues by navigating and solving riddles or puzzles that will unlock the doors and finally escape from the environment. These escape rooms use in virtual reality technology where the user can feel the real-time experience as he/she is there inside the environment. The user can also interact with the environment by picking objects, finding the clues, navigation, etc which provides real-time hands-on experience. Escape rooms can be designed as per the choice of the owner who creates the environment. The primary thing required for an escape room is a simple room and as per the assets used, it can be designed at a lower cost. If some changes/advancement is to be done inside the environment, the owner can directly change inside the project in unity software instead of completely changing the environment. The VR simulations can be viewed through many headsets namely HTC Vive, Oculus Rift, Oculus Quest, Google cardboard, etc. The Virtual Reality escape rooms can be created through various engines but this developed escape room is created using a unity engine. This VR escape room is designed for Oculus Quest 2 and it can be viewed through this VR headset.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crowd Exemption Notifier 人群豁免通知
Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9752887
A. K, P. G, B. Priya
Crowd management is a challenging problem in the pandemic situation to ensure public safety. To overcome the difficulties, many technologies have been incorporated to cope up with the problems. However, the effectiveness of these techniques is limited due to the density of the crowd changing from low to extremely high depending on the time. We propose a robust feature-based approach to deal with the problem of crowd management for people's security. We have evaluated our method using a dataset and have performed a detailed analysis. The crowd is monitored through a surveillance camera and the image is recognized frame by frame using OpenCV and the recognized frame is processed through the YoloV4 and COCO dataset to get the human identification count. When the crowd exceeds the allocated limit “Crowd Exemption Notifier” intimates the organizer. This mechanism could help the common people and the government to withstand the widespread viral disease.
在疫情形势下,人群管理是保障公共安全的一个具有挑战性的问题。为了克服这些困难,人们采用了许多技术来解决这些问题。然而,这些技术的有效性是有限的,因为人群的密度会随着时间的变化从低到极高。我们提出了一种鲁棒的基于特征的方法来处理人群管理问题,以保障人们的安全。我们使用数据集评估了我们的方法,并进行了详细的分析。通过监控摄像头对人群进行监控,使用OpenCV对图像进行逐帧识别,并通过YoloV4和COCO数据集对识别帧进行处理,得到人群识别计数。当人数超过指定限额时,“豁免人数通知”会通知主办单位。这种机制可以帮助普通民众和政府抵御广泛传播的病毒性疾病。
{"title":"Crowd Exemption Notifier","authors":"A. K, P. G, B. Priya","doi":"10.1109/ICACTA54488.2022.9752887","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752887","url":null,"abstract":"Crowd management is a challenging problem in the pandemic situation to ensure public safety. To overcome the difficulties, many technologies have been incorporated to cope up with the problems. However, the effectiveness of these techniques is limited due to the density of the crowd changing from low to extremely high depending on the time. We propose a robust feature-based approach to deal with the problem of crowd management for people's security. We have evaluated our method using a dataset and have performed a detailed analysis. The crowd is monitored through a surveillance camera and the image is recognized frame by frame using OpenCV and the recognized frame is processed through the YoloV4 and COCO dataset to get the human identification count. When the crowd exceeds the allocated limit “Crowd Exemption Notifier” intimates the organizer. This mechanism could help the common people and the government to withstand the widespread viral disease.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132570335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Speech Recognition for Tulu Language Using Gmm-Hmm and DNN-HMM Techniques 基于Gmm-Hmm和DNN-HMM技术的土鲁语语音自动识别
Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9753319
Amoolya G, Arnold Sachith A Hans, V. R. Lakkavalli, Senthil Kumar Swami Durai
In this work a first Automatic Speech Recognition (ASR) for Tulu language is developed. Seven hours of speech database for Tulu is recorded from native speakers in natural conditions for read speech. Kaldi toolkit is employed to develop GMM-HMM and DNN-HMM based ASR systems. Different speech units are employed to build the system and a detailed set of experiments is carried out on the collected dataset. It was observed that because of the lesser data, monophone GMM-HMM models provide better word error rate (WER) when compared to triphone models. More data is required for the system to reach to better performance with triphones.
本文首次开发了针对吐鲁语的自动语音识别系统。图鲁语的7小时语音数据库记录了母语人士在自然条件下的阅读语音。利用Kaldi工具箱开发基于GMM-HMM和DNN-HMM的ASR系统。采用不同的语音单元构建系统,并在收集到的数据集上进行了详细的实验。我们观察到,由于数据较少,单声道GMM-HMM模型比三声道模型提供更好的单词错误率(WER)。系统需要更多的数据才能达到更好的性能。
{"title":"Automatic Speech Recognition for Tulu Language Using Gmm-Hmm and DNN-HMM Techniques","authors":"Amoolya G, Arnold Sachith A Hans, V. R. Lakkavalli, Senthil Kumar Swami Durai","doi":"10.1109/ICACTA54488.2022.9753319","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753319","url":null,"abstract":"In this work a first Automatic Speech Recognition (ASR) for Tulu language is developed. Seven hours of speech database for Tulu is recorded from native speakers in natural conditions for read speech. Kaldi toolkit is employed to develop GMM-HMM and DNN-HMM based ASR systems. Different speech units are employed to build the system and a detailed set of experiments is carried out on the collected dataset. It was observed that because of the lesser data, monophone GMM-HMM models provide better word error rate (WER) when compared to triphone models. More data is required for the system to reach to better performance with triphones.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey on IoT based Farm Freshness Mobile Application 基于物联网的农场新鲜度移动应用调查
Pub Date : 2022-03-04 DOI: 10.1109/ICACTA54488.2022.9752796
B. Swathi, P. T, P. S, Shankar Y, G. V.
Food safety and hygiene are major concerns when it comes to preventing food waste. In India's major markets the fruits and vegetables are getting wasted due to temperature and humidity fluctuations. The quality of the food (fruits and vegetables) should be examined, and they should be guarded from rotting and decaying due to atmospheric aspects like temperatures, moisture, and shade, which help farmers conserve the food (fruits and vegetables) while in transit. An Android application based on the Internet of Things will be built in this article to monitor environmental elements such as heat, moisture, alcohol percentage, and light exposed. The Arduino UNO, a well-known popular tooling board, is at the heart of this device. Different sensors are interfaced to the Microcontroller board such as the DHT11, MQ3, LDR, $16times 2$ LCD, ESP8266 Wi-Fi, and Image sensor, which are all connected to an Android app where the user is notified with real-time data that defines the food quality. ML will be used to analyze the image captured by the app and predict the condition of the food. The app includes a chatbot that provides information on food quality. The app will suggest nearby organic stores based on the user's location. The app will also support Multilanguage's like English, Telugu, Tamil, Kannada and Hindi which will help the farmers, stakeholders to understand in their local language.
在防止食物浪费方面,食品安全和卫生是主要问题。在印度的主要市场,由于温度和湿度的波动,水果和蔬菜被浪费了。应该检查食物(水果和蔬菜)的质量,并且应该防止它们因温度、湿度和阴影等大气因素而腐烂和腐烂,这有助于农民在运输过程中保存食物(水果和蔬菜)。本文将构建一个基于物联网的Android应用程序,用于监测环境元素,如热量、湿度、酒精百分比和光照。Arduino UNO,一个著名的流行工具板,是这个设备的核心。不同的传感器连接到微控制器板,如DHT11, MQ3, LDR, 16 × 2美元LCD, ESP8266 Wi-Fi和图像传感器,这些传感器都连接到一个Android应用程序,在这个应用程序中,用户会收到定义食品质量的实时数据通知。机器学习将用于分析应用程序捕获的图像并预测食物的状况。该应用程序包括一个聊天机器人,可以提供有关食品质量的信息。该应用程序将根据用户的位置推荐附近的有机商店。该应用程序还将支持多语言,如英语、泰卢古语、泰米尔语、卡纳达语和印地语,这将帮助农民和利益相关者用当地语言理解。
{"title":"Survey on IoT based Farm Freshness Mobile Application","authors":"B. Swathi, P. T, P. S, Shankar Y, G. V.","doi":"10.1109/ICACTA54488.2022.9752796","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752796","url":null,"abstract":"Food safety and hygiene are major concerns when it comes to preventing food waste. In India's major markets the fruits and vegetables are getting wasted due to temperature and humidity fluctuations. The quality of the food (fruits and vegetables) should be examined, and they should be guarded from rotting and decaying due to atmospheric aspects like temperatures, moisture, and shade, which help farmers conserve the food (fruits and vegetables) while in transit. An Android application based on the Internet of Things will be built in this article to monitor environmental elements such as heat, moisture, alcohol percentage, and light exposed. The Arduino UNO, a well-known popular tooling board, is at the heart of this device. Different sensors are interfaced to the Microcontroller board such as the DHT11, MQ3, LDR, $16times 2$ LCD, ESP8266 Wi-Fi, and Image sensor, which are all connected to an Android app where the user is notified with real-time data that defines the food quality. ML will be used to analyze the image captured by the app and predict the condition of the food. The app includes a chatbot that provides information on food quality. The app will suggest nearby organic stores based on the user's location. The app will also support Multilanguage's like English, Telugu, Tamil, Kannada and Hindi which will help the farmers, stakeholders to understand in their local language.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1