首页 > 最新文献

2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)最新文献

英文 中文
Prototype Design For Energy Consumption In Smart Home Using IOT 基于物联网的智能家居能耗原型设计
K. Premkumar, K. Gokila Devi, B. Jamuna, G. Priyadharshini
Implementation of IOT is continued to be a challenging task in various industries. Power consumption for domestic purpose remains to a significant issue in modern era. The quickly growing conception of good home with good meters has its sizable amount of benefits. Our project is to monitor and control the usage of each and individual home appliances effectively. To consume the facility in good home terribly effectively automatic measuring threshold value (AMTV) formula is employed. By using this threshold value in AMTV algorithm, the user will notified about the consumption of electrical power. User can able to view the consumption of power in monthly, weekly and daily basis. Also, we can control each and every electrical appliance of our home from remote area. So the user can limit his usage of the appliances to avoid his EB bill amount without reaching the next slab in tariff table.
物联网的实施在各个行业仍然是一项具有挑战性的任务。在现代,家庭用电仍然是一个重要的问题。“好房子配好仪表”这一迅速发展的概念有其相当大的好处。我们的项目是有效地监测和控制每个和单个家用电器的使用情况。为了有效地利用好家居设备,采用了自动测量阈值(AMTV)公式。通过在AMTV算法中使用该阈值,用户将收到关于电力消耗的通知。用户可以查看每月、每周和每天的用电量。此外,我们可以远程控制家里的每一台电器。因此,用户可以限制其使用的电器,以避免他的EB账单金额,而没有达到下一个平板的关税表。
{"title":"Prototype Design For Energy Consumption In Smart Home Using IOT","authors":"K. Premkumar, K. Gokila Devi, B. Jamuna, G. Priyadharshini","doi":"10.1109/ICSCAN.2019.8878688","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878688","url":null,"abstract":"Implementation of IOT is continued to be a challenging task in various industries. Power consumption for domestic purpose remains to a significant issue in modern era. The quickly growing conception of good home with good meters has its sizable amount of benefits. Our project is to monitor and control the usage of each and individual home appliances effectively. To consume the facility in good home terribly effectively automatic measuring threshold value (AMTV) formula is employed. By using this threshold value in AMTV algorithm, the user will notified about the consumption of electrical power. User can able to view the consumption of power in monthly, weekly and daily basis. Also, we can control each and every electrical appliance of our home from remote area. So the user can limit his usage of the appliances to avoid his EB bill amount without reaching the next slab in tariff table.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133988561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Introspective Study on Dynamic Role-Centric RBAC Models 动态角色中心RBAC模型的内省研究
A. Suganthy, V. Prasanna Venkatesan
With the advent of internet and its related technologies, the organizations are more concerned in providing security to their resources. Access control models helps in providing the access limits to the users when the resources are being accessed by them and Role based access control (RBAC) model is one such access control mechanism in which the users access the resources based on the roles they acquire in the system. In the dynamic environment, the roles that an user acquires in the system is completely depending on the context in which the user sends an access request. This paper explores the concepts of RBAC models and their extensions. The main objective of this paper is to analyse the access control models by identifying their applications and limitations in the real world applications.
随着互联网及其相关技术的出现,组织越来越关注其资源的安全性。访问控制模型有助于在用户访问资源时对其进行访问限制,基于角色的访问控制(Role based Access control, RBAC)模型就是这样一种访问控制机制,用户根据在系统中获得的角色来访问资源。在动态环境中,用户在系统中获得的角色完全取决于用户发送访问请求的上下文。本文探讨了RBAC模型的概念及其扩展。本文的主要目的是通过识别访问控制模型在实际应用中的应用和局限性来分析访问控制模型。
{"title":"An Introspective Study on Dynamic Role-Centric RBAC Models","authors":"A. Suganthy, V. Prasanna Venkatesan","doi":"10.1109/ICSCAN.2019.8878827","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878827","url":null,"abstract":"With the advent of internet and its related technologies, the organizations are more concerned in providing security to their resources. Access control models helps in providing the access limits to the users when the resources are being accessed by them and Role based access control (RBAC) model is one such access control mechanism in which the users access the resources based on the roles they acquire in the system. In the dynamic environment, the roles that an user acquires in the system is completely depending on the context in which the user sends an access request. This paper explores the concepts of RBAC models and their extensions. The main objective of this paper is to analyse the access control models by identifying their applications and limitations in the real world applications.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133389572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A study of Prediction models for football player valuations by quantifying statistical and economic attributes for the global transfer market 基于量化全球转会市场统计和经济属性的足球运动员身价预测模型研究
Dibyanshu Patnaik, Harsh Praharaj, K. Prakash, Prof. Krishna Samdani
The global transfer market in the field of football has long been devoid of technology. Over the last two decades, the economic dynamics have completely been changed, and the amount of money which has been pumped has increased exponentially. Valuations for any physical entity with a well-defined set of parameters is a challenge in itself and depends on numerous other things. And doing the same for an individual with varying parameters, based on the source of data, is even more challenging. With this paper, we attempt to find the most optimum way of fetching data of football players and applying the right model on it so as to extract meaningful information, thus reducing the gap between the estimated prices and the Final price. We do so by crowdsourcing the data and applying regression techniques along with Opta index. We also try to find the results using Neural Networks and conclude with a comparison between our models
长期以来,足球领域的全球转会市场一直缺乏技术。在过去的二十年里,经济动态完全改变了,注入的资金数量呈指数级增长。对任何具有定义良好的参数集的物理实体进行估值本身就是一个挑战,并且取决于许多其他因素。根据数据来源的不同,对一个参数不同的人做同样的事情,就更具挑战性了。在本文中,我们试图找到最优的足球运动员数据提取方法,并对其应用合适的模型,以提取有意义的信息,从而减少估计价格与最终价格之间的差距。我们通过众包数据和应用回归技术以及Opta指数来做到这一点。我们还尝试使用神经网络来寻找结果,并在我们的模型之间进行比较
{"title":"A study of Prediction models for football player valuations by quantifying statistical and economic attributes for the global transfer market","authors":"Dibyanshu Patnaik, Harsh Praharaj, K. Prakash, Prof. Krishna Samdani","doi":"10.1109/ICSCAN.2019.8878843","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878843","url":null,"abstract":"The global transfer market in the field of football has long been devoid of technology. Over the last two decades, the economic dynamics have completely been changed, and the amount of money which has been pumped has increased exponentially. Valuations for any physical entity with a well-defined set of parameters is a challenge in itself and depends on numerous other things. And doing the same for an individual with varying parameters, based on the source of data, is even more challenging. With this paper, we attempt to find the most optimum way of fetching data of football players and applying the right model on it so as to extract meaningful information, thus reducing the gap between the estimated prices and the Final price. We do so by crowdsourcing the data and applying regression techniques along with Opta index. We also try to find the results using Neural Networks and conclude with a comparison between our models","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116419998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Drawbacks in 802.X and Significant Methodologies on Data Recovery 802的弊端分析。X和数据恢复的重要方法
S. Ananth, Likhitha Varma, K. Sundari, Meghana Koduru, G. Charan, Nibi Maouriyan
Bluetooth, a short range communication standard, helps in sharing information between paired devices with high security, using Frequency Hopping Spread Spectrum (FHSS) technique. When a file is being transmitted, the link between the devices undergo any distraction, and if the link is broken, even after transmitting 70% more amount of data, there will 0% in the receiver device, or it cannot be opened as its not completely received. The proposed idea is to develop an effective communication that will help an individual to retrieve the data, first, by moving the receiving content to permanent memory soon after every N bits received in buffer. Secondly by fixing a timeslot after which the content will be moved to permanent memory. With the amount of information received, using bilinear interpolation technique, the left out data (if it is below 30%) is predicted to complete the process.
蓝牙是一种短距离通信标准,使用跳频扩频(FHSS)技术,有助于在高安全性的配对设备之间共享信息。当文件在传输时,设备之间的链路发生干扰,如果链路断开,即使传输了70%以上的数据量,接收设备中也会有0%的数据,或者由于未完全接收而无法打开。提出的想法是开发一种有效的通信方式,帮助个人检索数据,首先,在缓冲区中每接收到N位后不久,将接收内容移动到永久存储器中。其次,通过固定一个时间段,之后的内容将被移动到永久存储器。根据接收到的信息量,使用双线性插值技术,预测漏出的数据(如果低于30%),完成整个过程。
{"title":"Analysis of Drawbacks in 802.X and Significant Methodologies on Data Recovery","authors":"S. Ananth, Likhitha Varma, K. Sundari, Meghana Koduru, G. Charan, Nibi Maouriyan","doi":"10.1109/ICSCAN.2019.8878735","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878735","url":null,"abstract":"Bluetooth, a short range communication standard, helps in sharing information between paired devices with high security, using Frequency Hopping Spread Spectrum (FHSS) technique. When a file is being transmitted, the link between the devices undergo any distraction, and if the link is broken, even after transmitting 70% more amount of data, there will 0% in the receiver device, or it cannot be opened as its not completely received. The proposed idea is to develop an effective communication that will help an individual to retrieve the data, first, by moving the receiving content to permanent memory soon after every N bits received in buffer. Secondly by fixing a timeslot after which the content will be moved to permanent memory. With the amount of information received, using bilinear interpolation technique, the left out data (if it is below 30%) is predicted to complete the process.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Electricity meter on Real time Price Forecasting and Monitoring system 智能电表实时电价预测监控系统
V. Aravind, M. Anbarasi, P. Maragathavalli, M. Suresh, M. Suresh
In Smart Grid, the Smart meters assume different role with smart capacities so as to satisfy the consumer’s needs. The Smart meter can gauge and impart detailed real time power utilization, empower remote continuous checking and control utilizations. The consumers are given ongoing valuing and analyses devoured data, with its technical information which is transmitted from the network, and furthermore give progressively itemized input on every machine to the consumer. This paper gives a review of the prediction and monitoring with respect to control utilization. It is focused to real time scenario like Smart metering and home apparatus like home sight and sound substance over the power utilization grid.
在智能电网中,智能电表以智能容量承担不同的角色,以满足用户的需求。智能电表可以测量并提供详细的实时电力使用情况,支持远程连续检查和控制使用情况。消费者被给予持续的评估和分析所吞噬的数据,以及从网络传输的技术信息,并进一步在每台机器上逐步逐项输入给消费者。本文对控制利用率的预测和监测进行了综述。它的重点是实时场景,如智能电表和家用设备,如家庭视觉和音响物质在电力利用电网。
{"title":"Smart Electricity meter on Real time Price Forecasting and Monitoring system","authors":"V. Aravind, M. Anbarasi, P. Maragathavalli, M. Suresh, M. Suresh","doi":"10.1109/ICSCAN.2019.8878836","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878836","url":null,"abstract":"In Smart Grid, the Smart meters assume different role with smart capacities so as to satisfy the consumer’s needs. The Smart meter can gauge and impart detailed real time power utilization, empower remote continuous checking and control utilizations. The consumers are given ongoing valuing and analyses devoured data, with its technical information which is transmitted from the network, and furthermore give progressively itemized input on every machine to the consumer. This paper gives a review of the prediction and monitoring with respect to control utilization. It is focused to real time scenario like Smart metering and home apparatus like home sight and sound substance over the power utilization grid.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125701291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Instantaneous Articulate Seeker For Cryptographic Cloud Storage 瞬时清晰的搜索密码云存储
D. Mohanapriya, V. Nandhini, A. Ramyha, T. Vijayasanthy
Cloud computing has become a major computing service platform in the computer science field. However it has drawbacks and challenges related to the privacy of data on cloud. Even though scholars researched over it, proper solutions have not yet been proposed that facilitate searching over encrypted data stored on cloud server. Data breach is also one major threat to cloud storage. In this project, we provide a phrase search scheme using bloom filter to search encrypted data from cloud server using multiple keywords. Besides, we also introduce the Proxy Re-encryption scheme that enables data owner to provide access rights to their desired data users. This scheme assures high speed searching and faster response time at a low cost of communication.
云计算已经成为计算机科学领域主要的计算服务平台。然而,它存在与云上数据隐私相关的缺点和挑战。尽管学者们对此进行了研究,但目前还没有提出合适的解决方案来方便地搜索存储在云服务器上的加密数据。数据泄露也是云存储的一个主要威胁。在这个项目中,我们提供了一个使用bloom过滤器的短语搜索方案,可以使用多个关键字从云服务器中搜索加密数据。此外,我们还介绍了代理重新加密方案,使数据所有者能够向其期望的数据用户提供访问权限。该方案以较低的通信成本保证了高速搜索和更快的响应时间。
{"title":"Instantaneous Articulate Seeker For Cryptographic Cloud Storage","authors":"D. Mohanapriya, V. Nandhini, A. Ramyha, T. Vijayasanthy","doi":"10.1109/ICSCAN.2019.8878811","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878811","url":null,"abstract":"Cloud computing has become a major computing service platform in the computer science field. However it has drawbacks and challenges related to the privacy of data on cloud. Even though scholars researched over it, proper solutions have not yet been proposed that facilitate searching over encrypted data stored on cloud server. Data breach is also one major threat to cloud storage. In this project, we provide a phrase search scheme using bloom filter to search encrypted data from cloud server using multiple keywords. Besides, we also introduce the Proxy Re-encryption scheme that enables data owner to provide access rights to their desired data users. This scheme assures high speed searching and faster response time at a low cost of communication.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124895095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perspective Analysis of Digital Voting Systems 数字投票系统的视角分析
G. Shanmugasundaram, A. Kalaimathy, M. Johnvee, S. Pavithra
Detection of fake votes is a major problem in current voting system. Traditionally, Electronic voting machines have been developed to improve the reliability of the electoral process. Generally EVM’s requires more manpower. Some of the recent technologies have been contributed much to improve the Election process with different voting concepts. But still there is a difficulty in detecting the fake votes. In this article we examine the various concepts to achieve transparency over the database and also explores various key challenges in digital voting.
假票的检测是当前投票系统的一个主要问题。传统上,开发电子投票机是为了提高选举过程的可靠性。通常EVM需要更多的人力。最近的一些技术已经贡献了很多,以改善不同的投票概念的选举过程。但在检测假选票方面仍然存在困难。在本文中,我们研究了实现数据库透明度的各种概念,并探讨了数字投票中的各种关键挑战。
{"title":"Perspective Analysis of Digital Voting Systems","authors":"G. Shanmugasundaram, A. Kalaimathy, M. Johnvee, S. Pavithra","doi":"10.1109/ICSCAN.2019.8878849","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878849","url":null,"abstract":"Detection of fake votes is a major problem in current voting system. Traditionally, Electronic voting machines have been developed to improve the reliability of the electoral process. Generally EVM’s requires more manpower. Some of the recent technologies have been contributed much to improve the Election process with different voting concepts. But still there is a difficulty in detecting the fake votes. In this article we examine the various concepts to achieve transparency over the database and also explores various key challenges in digital voting.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127382777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tinge within the Fringe 边缘的色彩
M. Shanmugam, V. Venkatesan, R. Abinaya, E. Udayasri, C. Sharanya
Augmented Reality (AR) is a technology that provides the composite view of an environment, thus presenting quite amazing experience for the user who utilizes the applications that apply it. Coloring is always fun and if Augmented Reality is embedded with coloring, then it is definitely an amusement. Coloring owns an important part in autistic children as they detect colors with higher intensity and have strong ability to associate colors with entities. Hence, we will create a model that will deploy Augmented Reality, providing a learning experience along with coloring to engage the autistic children at home.
增强现实(AR)是一种提供环境复合视图的技术,因此为使用应用它的应用程序的用户提供了相当惊人的体验。着色总是很有趣的,如果增强现实嵌入了着色,那么它绝对是一种娱乐。颜色在自闭症儿童中占有重要的地位,因为他们对颜色的感知强度更高,并且有很强的将颜色与实体联系起来的能力。因此,我们将创建一个模型,将部署增强现实,提供学习经验以及着色,以吸引自闭症儿童在家里。
{"title":"Tinge within the Fringe","authors":"M. Shanmugam, V. Venkatesan, R. Abinaya, E. Udayasri, C. Sharanya","doi":"10.1109/ICSCAN.2019.8878824","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878824","url":null,"abstract":"Augmented Reality (AR) is a technology that provides the composite view of an environment, thus presenting quite amazing experience for the user who utilizes the applications that apply it. Coloring is always fun and if Augmented Reality is embedded with coloring, then it is definitely an amusement. Coloring owns an important part in autistic children as they detect colors with higher intensity and have strong ability to associate colors with entities. Hence, we will create a model that will deploy Augmented Reality, providing a learning experience along with coloring to engage the autistic children at home.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plant disease analysis using image processing in MATLAB 植物病害分析用MATLAB图像处理
H. Krishnan, P. K., G. M, M. N, S. Vijayananth, P. Sudhakar
Recognizable proof of plant ailment is troublesome in horticulture field. In the event that recognizable proof is mistaken, at that point there is an enormous misfortune on the generation of yield and efficient estimation of market. Leaf infection recognition requires tremendous sum of work, information in the plant sicknesses, and furthermore require the additionally preparing time. So we can utilize picture handling for recognizable proof of leaf infection in MATLAB. Recognizable proof of ailment pursues the means like stacking the picture, differentiate upgrade, changing over RGB to HSI, extricating of highlights and SVM.
植物病害的鉴定是园艺学研究的难点。如果可识别的证据是错误的,那么在收益率的产生和市场的有效估计上就会出现巨大的不幸。叶片侵染的识别不仅需要大量的工作和植物病害信息,而且还需要额外的准备时间。因此,我们可以在MATLAB中利用图像处理来识别叶片感染的证据。疾病的识别证明采用图片叠加、差异化升级、RGB转HSI、高光提取和SVM等手段。
{"title":"Plant disease analysis using image processing in MATLAB","authors":"H. Krishnan, P. K., G. M, M. N, S. Vijayananth, P. Sudhakar","doi":"10.1109/ICSCAN.2019.8878753","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878753","url":null,"abstract":"Recognizable proof of plant ailment is troublesome in horticulture field. In the event that recognizable proof is mistaken, at that point there is an enormous misfortune on the generation of yield and efficient estimation of market. Leaf infection recognition requires tremendous sum of work, information in the plant sicknesses, and furthermore require the additionally preparing time. So we can utilize picture handling for recognizable proof of leaf infection in MATLAB. Recognizable proof of ailment pursues the means like stacking the picture, differentiate upgrade, changing over RGB to HSI, extricating of highlights and SVM.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127849982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Encrypted Cloud Based Personal Health Record Management Using DES Scheme 基于DES方案的加密云个人健康记录管理
S. Pariselvam, M. Swarnamukhi
Cloud-based Personal Health Record systems (CB-PHR)’s majorly used for management of patient’s individual health records. Cloud computing are providing real-time healthcare data sharing in a cost-effective manner. Data security and privacy of maintaining personal health records are main obstacles for the wide adoption of CB-PHR systems, since health information is highly sensitive, so it needed to be protected in highly secured manner. In this paper, we propose a novel scheme using Data Encryption Standard (DES) technique for maintaining health record based on challenges and various securities in existing system. In this scheme, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing with a single data query submitted by data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content.
基于云的个人健康记录系统(CB-PHR)主要用于管理患者的个人健康记录。云计算以经济高效的方式提供实时医疗保健数据共享。数据安全和维护个人健康记录的隐私是广泛采用CB-PHR系统的主要障碍,因为健康信息高度敏感,因此需要以高度安全的方式加以保护。本文针对现有系统存在的问题和安全性问题,提出了一种基于数据加密标准(DES)技术的健康记录维护方案。在该方案中,索引在不同的对称密钥下加密,并且来自不同数据提供者的加密数据索引可以在不知道索引内容的情况下由云进行合并。它还通过数据用户提交的单个数据查询提供高效且保护隐私的查询处理。加密后的数据将由云在不知道其查询内容的情况下从所有相关数据提供商处处理。
{"title":"Encrypted Cloud Based Personal Health Record Management Using DES Scheme","authors":"S. Pariselvam, M. Swarnamukhi","doi":"10.1109/ICSCAN.2019.8878773","DOIUrl":"https://doi.org/10.1109/ICSCAN.2019.8878773","url":null,"abstract":"Cloud-based Personal Health Record systems (CB-PHR)’s majorly used for management of patient’s individual health records. Cloud computing are providing real-time healthcare data sharing in a cost-effective manner. Data security and privacy of maintaining personal health records are main obstacles for the wide adoption of CB-PHR systems, since health information is highly sensitive, so it needed to be protected in highly secured manner. In this paper, we propose a novel scheme using Data Encryption Standard (DES) technique for maintaining health record based on challenges and various securities in existing system. In this scheme, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing with a single data query submitted by data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content.","PeriodicalId":363880,"journal":{"name":"2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121299277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1