首页 > 最新文献

2023 3rd International Conference on Smart Data Intelligence (ICSMDI)最新文献

英文 中文
Age and Gender Recognition using Deep Learning Technique 使用深度学习技术识别年龄和性别
Pub Date : 2023-03-01 DOI: 10.1109/ICSMDI57622.2023.00052
Margi Patel, Upendra Singh
Gender classification is popular because it includes information about male and female social activities. Faces make it difficult to derive gender-discriminating visuals. Gender classification is based on looks. Automatic gender classification is popular because genders include rich social information. Classification has grown increasingly important in many industries. In a conservative society, gender classification can be usedin certain contexts. Identifying gender type is crucial to keeping extremists out of safe locations, especially in sensitive areas. A similar technique is utilized in female-only railway carriages, gender-specific marketing, and temples. Biometrics debates gender classification from facial pictures. Traditional ways categorize hand-crafted features globally and locally. These gender-identification systems need subject knowledge and are ineffective. Human gender identification is easy, but machines struggle. We listed numerous gender classification pre-processing approaches, such as contrast and brightness normalization. To create a gender and age classification framework Deep Belief Networks employs Shifted Filter Responses to identify features. The suggested model achieves 98% and 99% accuracy on the benchmark dataset.
性别分类很受欢迎,因为它包含了男性和女性社会活动的信息。人脸使得很难得出性别歧视的视觉效果。性别分类是基于外貌的。由于性别包含了丰富的社会信息,自动性别分类很受欢迎。分类在许多行业中变得越来越重要。在一个保守的社会中,性别分类可以在某些情况下使用。识别性别类型对于防止极端分子进入安全地点至关重要,尤其是在敏感地区。女性专用的火车车厢、针对性别的营销和寺庙也采用了类似的技术。生物识别技术从面部图片中争论性别分类。传统方法将手工制作的特征分为全局和局部。这些性别识别系统需要学科知识,而且效率低下。人类的性别识别很容易,但机器却很难。我们列出了许多性别分类预处理方法,如对比度和亮度归一化。为了创建性别和年龄分类框架,深度信念网络采用移位过滤响应来识别特征。建议的模型在基准数据集上达到98%和99%的准确率。
{"title":"Age and Gender Recognition using Deep Learning Technique","authors":"Margi Patel, Upendra Singh","doi":"10.1109/ICSMDI57622.2023.00052","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00052","url":null,"abstract":"Gender classification is popular because it includes information about male and female social activities. Faces make it difficult to derive gender-discriminating visuals. Gender classification is based on looks. Automatic gender classification is popular because genders include rich social information. Classification has grown increasingly important in many industries. In a conservative society, gender classification can be usedin certain contexts. Identifying gender type is crucial to keeping extremists out of safe locations, especially in sensitive areas. A similar technique is utilized in female-only railway carriages, gender-specific marketing, and temples. Biometrics debates gender classification from facial pictures. Traditional ways categorize hand-crafted features globally and locally. These gender-identification systems need subject knowledge and are ineffective. Human gender identification is easy, but machines struggle. We listed numerous gender classification pre-processing approaches, such as contrast and brightness normalization. To create a gender and age classification framework Deep Belief Networks employs Shifted Filter Responses to identify features. The suggested model achieves 98% and 99% accuracy on the benchmark dataset.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127394692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized E-Commerce Platform Implemented using Smart Contracts 使用智能合约实现的去中心化电子商务平台
Pub Date : 2023-03-01 DOI: 10.1109/ICSMDI57622.2023.00013
B. Liya, Pritam S, R. S, Navin K
The internet has evolved a lot in the last 40 years and its early applications has become unrecognizable. Web 1.0 focused on serving static pages is considered as the read-only web, whereas web 2.0 made way for dynamic pages making it as read-write web, which is predominantly experienced. The main problem face here is, as the users of E-commerce applications, is single-point-of-failure (SPOF), which means, the data stored in centralized servers is highly susceptible and vulnerable to attacks. Now, the internet's next evolution enables to develop decentralized applications and adds few other features like trustlessness, distributed, transparent, robust, etc. This also makes web 3.0 as read-write-own web. Now, this evolution wave of decentralization has hit the applications. To overcome this problem, this study has proposed a solution to completely decentralize the E-Commerce platform by using Blockchain in conjunction with smart contracts and utilizes the decentralized storage like IPFS (Inter Planetary File System). This article has developed a system that uses ReactJs as the frontend and the Ethereum blockchain as the backend to execute smart contracts using the EVM (Ethereum Virtual Machine) and to store data in a decentralized way by using IPFS and BigChainDb.
互联网在过去的40年里发展了很多,它的早期应用已经变得面目全非。专注于提供静态页面的Web 1.0被认为是只读Web,而Web 2.0为动态页面让路,使其成为读写Web,这是主要的经验。作为电子商务应用程序的用户,这里面临的主要问题是单点故障(SPOF),这意味着存储在集中式服务器中的数据非常容易受到攻击。现在,互联网的下一次进化使开发分散的应用程序成为可能,并增加了一些其他特性,如无信任、分布式、透明、健壮等。这也使得web 3.0成为了一个自主读写的web。现在,这种去中心化的进化浪潮已经冲击到应用程序。为了克服这一问题,本研究提出了一种解决方案,通过将区块链与智能合约相结合,利用IPFS (Inter Planetary File System)等去中心化存储,实现电子商务平台的完全去中心化。本文开发了一个系统,使用ReactJs作为前端,以太坊区块链作为后端,使用EVM(以太坊虚拟机)执行智能合约,并使用IPFS和BigChainDb以分散的方式存储数据。
{"title":"Decentralized E-Commerce Platform Implemented using Smart Contracts","authors":"B. Liya, Pritam S, R. S, Navin K","doi":"10.1109/ICSMDI57622.2023.00013","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00013","url":null,"abstract":"The internet has evolved a lot in the last 40 years and its early applications has become unrecognizable. Web 1.0 focused on serving static pages is considered as the read-only web, whereas web 2.0 made way for dynamic pages making it as read-write web, which is predominantly experienced. The main problem face here is, as the users of E-commerce applications, is single-point-of-failure (SPOF), which means, the data stored in centralized servers is highly susceptible and vulnerable to attacks. Now, the internet's next evolution enables to develop decentralized applications and adds few other features like trustlessness, distributed, transparent, robust, etc. This also makes web 3.0 as read-write-own web. Now, this evolution wave of decentralization has hit the applications. To overcome this problem, this study has proposed a solution to completely decentralize the E-Commerce platform by using Blockchain in conjunction with smart contracts and utilizes the decentralized storage like IPFS (Inter Planetary File System). This article has developed a system that uses ReactJs as the frontend and the Ethereum blockchain as the backend to execute smart contracts using the EVM (Ethereum Virtual Machine) and to store data in a decentralized way by using IPFS and BigChainDb.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128183445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Classification from Unsupervised Learning of 3D Objects 基于无监督学习的3D物体图像分类
Pub Date : 2023-03-01 DOI: 10.1109/ICSMDI57622.2023.00096
Pavan Kumar Mahadasu, Durga Prasad Seetha, S. T. Krishna, B. Venkateswarlu
This article intends to propose a technique for categorizing 3D deformable objects from unprocessed single-view images. The proposed technique is built on an autoencoder, which considers the depth, albedo, and viewpoint of each input image. By considering the symmetry that many object categories exhibit, at least in theory to independently untangle these parts from one another. This manuscript shows the demonstration how, even when shading causes the appearance of an object to be nonsymmetric, Still, the underlying object symmetry by using illumination-related reasoning. Additionally, by forecasting a symmetry probability map that is learned end to end with the other model elements, and represents things that are not symmetric. Experimental results demonstrate that, without assistance or the use of a pre-existing form model, this method is capable of recovering the 3D shape of humanoid faces, cat images, and automobile images with remarkable accuracy from single-view photos. As compared to the level of 2D picture correspondences, show superior accuracy on benchmarks in comparison to another system that makes use of supervision.
本文提出了一种从未处理的单视图图像中对三维可变形物体进行分类的技术。该技术建立在一个自动编码器上,该编码器考虑了每个输入图像的深度、反照率和视点。通过考虑许多物体类别所表现出的对称性,至少在理论上可以独立地将这些部分彼此分开。这篇手稿展示了如何演示,即使当阴影导致一个对象的外观是不对称的,但是,通过使用照明相关的推理,潜在的对象对称。此外,通过预测与其他模型元素端到端学习的对称概率映射,并表示不对称的事物。实验结果表明,该方法能够在不借助或使用预先存在的形状模型的情况下,从单视图照片中恢复类人面部、猫图像和汽车图像的三维形状,并且具有较高的精度。与2D图像对应的水平相比,与使用监督的另一个系统相比,在基准测试中显示出更高的准确性。
{"title":"Image Classification from Unsupervised Learning of 3D Objects","authors":"Pavan Kumar Mahadasu, Durga Prasad Seetha, S. T. Krishna, B. Venkateswarlu","doi":"10.1109/ICSMDI57622.2023.00096","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00096","url":null,"abstract":"This article intends to propose a technique for categorizing 3D deformable objects from unprocessed single-view images. The proposed technique is built on an autoencoder, which considers the depth, albedo, and viewpoint of each input image. By considering the symmetry that many object categories exhibit, at least in theory to independently untangle these parts from one another. This manuscript shows the demonstration how, even when shading causes the appearance of an object to be nonsymmetric, Still, the underlying object symmetry by using illumination-related reasoning. Additionally, by forecasting a symmetry probability map that is learned end to end with the other model elements, and represents things that are not symmetric. Experimental results demonstrate that, without assistance or the use of a pre-existing form model, this method is capable of recovering the 3D shape of humanoid faces, cat images, and automobile images with remarkable accuracy from single-view photos. As compared to the level of 2D picture correspondences, show superior accuracy on benchmarks in comparison to another system that makes use of supervision.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126364151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA based Vending Machine For Logical Gates 基于FPGA的逻辑门自动售货机
Pub Date : 2023-03-01 DOI: 10.1109/ICSMDI57622.2023.00059
Nayana Shivanand, Meenakshi L Rathod, Chetan S
Recently we have seen many Vending machines dispense things like toys, chocolates, shakes, snacks, lottery tickets, etc. Vending machines automatically dispense the different products when a consumer puts a currency or colored or different size token. The requirements for modern vending machines are increasing rapidly due to their ease of use. This research work intends to design a vending machine to sell eight different integrated circuits (ICs). Users can select the desired product and quantity of the product while inserting the currency. The proposed model also shows the available stock and total amount for the entered product. Here, FPGA is used to design the proposed Vending Machine (VM) as FPGAs are more flexible than embedded systems. The proposed vending machine is mainly used to vend the logical gates. It has better advantages as the quantity and amount can be entered according to the user requirements. The developed vending machine can be used in schools, research laboratories etc. FPGAs can be reprogrammed any number of times, consume less power and work faster than CMOS based Vending machines. Finally, the proposed design is simulated using Xilinx 14.7 and then implemented using FPGA kit artic 7.
最近我们看到许多自动售货机出售玩具、巧克力、奶昔、零食、彩票等东西。当消费者投放货币、彩色或不同大小的代币时,自动售货机就会自动分发不同的产品。由于使用方便,对现代自动售货机的需求正在迅速增加。这项研究工作旨在设计一个自动售货机,出售八种不同的集成电路(ic)。用户可以在输入货币的同时选择所需的产品和数量。所建议的模型还显示了输入产品的可用库存和总金额。在这里,FPGA被用来设计提议的自动售货机(VM),因为FPGA比嵌入式系统更灵活。所提出的自动售货机主要用于逻辑门的自动售货。数量和金额可根据用户要求输入,具有较好的优势。所研制的自动售货机可用于学校、科研实验室等场所。fpga可以多次重新编程,功耗更低,工作速度比基于CMOS的自动售货机快。最后,利用Xilinx 14.7对所提出的设计进行了仿真,然后利用FPGA套件artic 7实现了该设计。
{"title":"FPGA based Vending Machine For Logical Gates","authors":"Nayana Shivanand, Meenakshi L Rathod, Chetan S","doi":"10.1109/ICSMDI57622.2023.00059","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00059","url":null,"abstract":"Recently we have seen many Vending machines dispense things like toys, chocolates, shakes, snacks, lottery tickets, etc. Vending machines automatically dispense the different products when a consumer puts a currency or colored or different size token. The requirements for modern vending machines are increasing rapidly due to their ease of use. This research work intends to design a vending machine to sell eight different integrated circuits (ICs). Users can select the desired product and quantity of the product while inserting the currency. The proposed model also shows the available stock and total amount for the entered product. Here, FPGA is used to design the proposed Vending Machine (VM) as FPGAs are more flexible than embedded systems. The proposed vending machine is mainly used to vend the logical gates. It has better advantages as the quantity and amount can be entered according to the user requirements. The developed vending machine can be used in schools, research laboratories etc. FPGAs can be reprogrammed any number of times, consume less power and work faster than CMOS based Vending machines. Finally, the proposed design is simulated using Xilinx 14.7 and then implemented using FPGA kit artic 7.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cardio Vascular Disease Prediction and Classification Report Generation using Data Mining Technique 基于数据挖掘技术的心血管疾病预测与分类报告生成
Pub Date : 2023-03-01 DOI: 10.1109/ICSMDI57622.2023.00061
T. Jebaseeli, Navin Kumar M, Angeleen Subagar, Santhosh A
Cardiovascular disease is one of the primary reasons for death in the world today. It has evolved into one of the most challenging illnesses to identify. By a recent WHO research, heart disorders are on the rise. As a result, 17.9 million people die each year. As the population increased, this became increasingly difficult to diagnose and initiate treatment during the initial stages. When it comes to forecasting coronary heart disease, medical analysis of data encounters a huge challenge. Electronic health record systems are currently used to handle the data of patients in hospitals. The huge amount of information created by the medical industry is being misused. A new approach is required to reduce costs and accurately predict heart disease. Hospitals can use appropriate decision support systems to reduce the cost of clinical tests. Several types of research offer barely a glimpse of optimism for employing machine learning approaches for predicting cardiac disease. The proposed study suggests a unique strategy for finding key characteristics via a machine learning approach throughout this work, which would also improve the precision of cardiovascular risk diagnosis. Diverse characteristic correlations and classification algorithms are used to establish the statistical model. Using the Improved random forest with Hyper - parameters tweaking in the classification algorithm for cardiovascular disease, a better reliability with an acceptable accuracy of 94.5% has been obtained. This approach may be valuable to healthcare professionals in their treatment as a decision assistance system.
心血管疾病是当今世界上死亡的主要原因之一。它已经演变成最具挑战性的疾病之一。世卫组织最近的一项研究表明,心脏病发病率正在上升。因此,每年有1790万人死亡。随着人口的增加,在最初阶段诊断和开始治疗变得越来越困难。在预测冠心病时,医学数据分析遇到了巨大的挑战。电子健康记录系统目前用于处理医院病人的数据。医疗行业创造的大量信息正在被滥用。需要一种新的方法来降低成本并准确预测心脏病。医院可以使用适当的决策支持系统来降低临床试验的成本。有几种类型的研究对利用机器学习方法预测心脏病几乎没有一丝乐观。这项研究提出了一种独特的策略,通过机器学习方法在整个研究过程中找到关键特征,这也将提高心血管风险诊断的准确性。采用多种特征关联和分类算法建立统计模型。在心血管疾病分类算法中使用改进的随机森林进行超参数调整,获得了较好的可靠性,准确率为94.5%。这种方法可能是有价值的医疗保健专业人员在他们的治疗决策辅助系统。
{"title":"Cardio Vascular Disease Prediction and Classification Report Generation using Data Mining Technique","authors":"T. Jebaseeli, Navin Kumar M, Angeleen Subagar, Santhosh A","doi":"10.1109/ICSMDI57622.2023.00061","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00061","url":null,"abstract":"Cardiovascular disease is one of the primary reasons for death in the world today. It has evolved into one of the most challenging illnesses to identify. By a recent WHO research, heart disorders are on the rise. As a result, 17.9 million people die each year. As the population increased, this became increasingly difficult to diagnose and initiate treatment during the initial stages. When it comes to forecasting coronary heart disease, medical analysis of data encounters a huge challenge. Electronic health record systems are currently used to handle the data of patients in hospitals. The huge amount of information created by the medical industry is being misused. A new approach is required to reduce costs and accurately predict heart disease. Hospitals can use appropriate decision support systems to reduce the cost of clinical tests. Several types of research offer barely a glimpse of optimism for employing machine learning approaches for predicting cardiac disease. The proposed study suggests a unique strategy for finding key characteristics via a machine learning approach throughout this work, which would also improve the precision of cardiovascular risk diagnosis. Diverse characteristic correlations and classification algorithms are used to establish the statistical model. Using the Improved random forest with Hyper - parameters tweaking in the classification algorithm for cardiovascular disease, a better reliability with an acceptable accuracy of 94.5% has been obtained. This approach may be valuable to healthcare professionals in their treatment as a decision assistance system.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128316857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Innovative Methods for Enhancing Data Security in Computing 探索提高计算数据安全的创新方法
Pub Date : 2023-03-01 DOI: 10.1109/ICSMDI57622.2023.00019
Aishwarya Prakash, S. Chauhan
Thousands of gigabytes of data are produced each minute by everyone in today's society. This data is being stored in clouds worldwide. The study addressed these security issues in a variety of ways. This research suggests a cloud computing security architecture based on cryptography and steganography. In addition to using symmetric and steganographic techniques, the model is said to meet all security standards, such as security resilience, secrecy, authentication, integrity, and non-repudiation. This method employs the Advanced Encryption Standard (AES) 256 and steganography to provide multilayer encryption and decryption at both the transmitter and receiver sides, boosting cloud storage security. This security paradigm delivers transparency to cloud users and service providers to alleviate security worries. The suggested model is written in Python and operates on the Amazon Web Services cloud. While compared to the old method, this approach enhances data security and saves time when uploading and downloading text files.
在当今社会,每个人每分钟都会产生数千千兆字节的数据。这些数据被存储在全球的云中。该研究以多种方式解决了这些安全问题。本研究提出了一种基于密码学和隐写术的云计算安全架构。除了使用对称和隐写技术外,据说该模型还满足所有安全标准,例如安全弹性、保密性、身份验证、完整性和不可否认性。该方法采用高级加密标准AES (Advanced Encryption Standard) 256和隐写技术,在发送端和接收端都提供多层加解密,提高了云存储的安全性。这种安全范例为云用户和服务提供商提供了透明度,从而减轻了安全方面的担忧。建议的模型是用Python编写的,并在Amazon Web Services云上运行。与旧方法相比,该方法提高了数据安全性,并节省了上传和下载文本文件的时间。
{"title":"Exploring Innovative Methods for Enhancing Data Security in Computing","authors":"Aishwarya Prakash, S. Chauhan","doi":"10.1109/ICSMDI57622.2023.00019","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00019","url":null,"abstract":"Thousands of gigabytes of data are produced each minute by everyone in today's society. This data is being stored in clouds worldwide. The study addressed these security issues in a variety of ways. This research suggests a cloud computing security architecture based on cryptography and steganography. In addition to using symmetric and steganographic techniques, the model is said to meet all security standards, such as security resilience, secrecy, authentication, integrity, and non-repudiation. This method employs the Advanced Encryption Standard (AES) 256 and steganography to provide multilayer encryption and decryption at both the transmitter and receiver sides, boosting cloud storage security. This security paradigm delivers transparency to cloud users and service providers to alleviate security worries. The suggested model is written in Python and operates on the Amazon Web Services cloud. While compared to the old method, this approach enhances data security and saves time when uploading and downloading text files.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132458817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Secure and Privacy Preserving Telehealth Solution in Fog Based Environment 基于雾环境的安全隐私远程医疗解决方案
Pub Date : 2023-03-01 DOI: 10.1109/ICSMDI57622.2023.00016
Srijeet Gopalan, Rohit Verma, Shivani Jaswal
The emergence of smart health facilitates readily available healthcare services. Increased demand for medical services, on the other hand, necessitates additional computing and storage resources near patients/users for smart sensing, analysis and processing. Fog Computing (FC) is a rapidly evolving field, which is considered as a valuable addition to the cloud to address issues such as unpredictable latency, resource constraints, confidentiality, and easy accessibility. Since information can be easily stored and assessed relatively close to sources of information on native fog nodes, it is relatively safe as compared to cloud computing. Still, the existing fog models face number of challenges, and focuses on one of two things: accuracy of data obtained or low turnaround time, not both. This paper proposes SPATS, a Secure AES encryption enabled Privacy Assured Telehealth System that addresses privacy and security threats in a fog environment by integrating stacking classifier in fog devices and deploying it in a real-world application of automatic health analysis. The AES encryption technology is used to ensure privacy and security from attackers while sensitive data is stored in cloud. A detailed experimentation and analysis have been done using EHR dataset from real-world medical services to assess the performance of SPATS. The results of the experiments reveal that the proposed system accurately predicts the health condition. When compared to existing machine learning techniques, the suggested approach achieves a better prediction accuracy.
智能健康的出现促进了随时可用的医疗保健服务。另一方面,对医疗服务的需求增加,需要在患者/用户附近增加计算和存储资源,以便进行智能传感、分析和处理。雾计算(FC)是一个快速发展的领域,它被认为是云计算的一个有价值的补充,可以解决诸如不可预测的延迟、资源约束、机密性和易于访问等问题。由于信息可以在本地雾节点上相对靠近信息源的地方轻松存储和评估,因此与云计算相比,它相对安全。然而,现有的雾模型面临着许多挑战,主要集中在两件事之一:获得的数据的准确性或较低的周转时间,而不是两者兼而有之。本文提出了SPATS,一种安全AES加密的隐私保证远程医疗系统,通过在雾设备中集成堆叠分类器并将其部署在自动健康分析的实际应用中,解决雾环境中的隐私和安全威胁。采用AES加密技术,在敏感数据存储于云端的同时,确保隐私和安全不受攻击者攻击。使用来自真实医疗服务的EHR数据集进行了详细的实验和分析,以评估SPATS的性能。实验结果表明,该系统能够准确地预测健康状况。与现有的机器学习技术相比,该方法具有更好的预测精度。
{"title":"A Secure and Privacy Preserving Telehealth Solution in Fog Based Environment","authors":"Srijeet Gopalan, Rohit Verma, Shivani Jaswal","doi":"10.1109/ICSMDI57622.2023.00016","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00016","url":null,"abstract":"The emergence of smart health facilitates readily available healthcare services. Increased demand for medical services, on the other hand, necessitates additional computing and storage resources near patients/users for smart sensing, analysis and processing. Fog Computing (FC) is a rapidly evolving field, which is considered as a valuable addition to the cloud to address issues such as unpredictable latency, resource constraints, confidentiality, and easy accessibility. Since information can be easily stored and assessed relatively close to sources of information on native fog nodes, it is relatively safe as compared to cloud computing. Still, the existing fog models face number of challenges, and focuses on one of two things: accuracy of data obtained or low turnaround time, not both. This paper proposes SPATS, a Secure AES encryption enabled Privacy Assured Telehealth System that addresses privacy and security threats in a fog environment by integrating stacking classifier in fog devices and deploying it in a real-world application of automatic health analysis. The AES encryption technology is used to ensure privacy and security from attackers while sensitive data is stored in cloud. A detailed experimentation and analysis have been done using EHR dataset from real-world medical services to assess the performance of SPATS. The results of the experiments reveal that the proposed system accurately predicts the health condition. When compared to existing machine learning techniques, the suggested approach achieves a better prediction accuracy.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133231445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Indoor Positioning Technology of RFID Nodes in the Internet of Things (IoT) 物联网中RFID节点室内定位技术研究
Pub Date : 2023-03-01 DOI: 10.1109/ICSMDI57622.2023.00100
Luoli, Amit Yadav, Asif Khan
With the emergence of Internet of Things (IoT) applications that provide services based on location information. The Radio Frequency Identification (RFID) technology is considered as one of the key technologies of the Internet of Things' sensing layer. In the Internet of Things (IoT) domain, further research on the positioning technology of RFID nodes has significant practical implications. Initially, this article analyzes a variety of existing RFID indoor positioning technologies and then focuses on fingerprint positioning technology to improve the traditional fingerprint positioning algorithm and finally demonstrates that the improved algorithm delivers more accurate positioning through MATLAB simulation.
随着物联网(IoT)应用的出现,提供基于位置信息的服务。无线射频识别(RFID)技术被认为是物联网感知层的关键技术之一。在物联网(IoT)领域,进一步研究RFID节点定位技术具有重要的现实意义。本文首先分析了现有的各种RFID室内定位技术,然后重点研究了指纹定位技术,对传统的指纹定位算法进行了改进,最后通过MATLAB仿真证明了改进后的算法能够实现更准确的定位。
{"title":"Research on Indoor Positioning Technology of RFID Nodes in the Internet of Things (IoT)","authors":"Luoli, Amit Yadav, Asif Khan","doi":"10.1109/ICSMDI57622.2023.00100","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00100","url":null,"abstract":"With the emergence of Internet of Things (IoT) applications that provide services based on location information. The Radio Frequency Identification (RFID) technology is considered as one of the key technologies of the Internet of Things' sensing layer. In the Internet of Things (IoT) domain, further research on the positioning technology of RFID nodes has significant practical implications. Initially, this article analyzes a variety of existing RFID indoor positioning technologies and then focuses on fingerprint positioning technology to improve the traditional fingerprint positioning algorithm and finally demonstrates that the improved algorithm delivers more accurate positioning through MATLAB simulation.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130019704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Intrusion Detection using Machine Learning Algorithms 使用机器学习算法的网络入侵检测
Pub Date : 2023-03-01 DOI: 10.1109/ICSMDI57622.2023.00071
B. Babu, G.Akshay Reddy, D.Kushal Goud, K. Naveen, K. T. Reddy
The advancement in wireless communication technology has led to various security challenges in networks. To combat these issues, Network Intrusion Detection Systems (NIDS) are employed to identify attacks. To enhance their accuracy in detecting intruders, various machine learning techniques have been previously used with NIDS. This paper presents a new approach that utilizes machine learning techniques to identify intrusions. The findings of our model indicate that it outperforms other methods, such as Naive Bayes, in terms of accuracy. Our method resulted in a performance time of 1.26 minutes, an accuracy rate of 97.38%, and an error rate of 0.25%.
无线通信技术的发展给网络安全带来了诸多挑战。为了解决这些问题,网络入侵检测系统(NIDS)被用来识别攻击。为了提高检测入侵者的准确性,各种机器学习技术先前已与NIDS一起使用。本文提出了一种利用机器学习技术识别入侵的新方法。我们的模型的发现表明,它优于其他方法,如朴素贝叶斯,在准确性方面。结果表明,该方法的性能时间为1.26分钟,准确率为97.38%,错误率为0.25%。
{"title":"Network Intrusion Detection using Machine Learning Algorithms","authors":"B. Babu, G.Akshay Reddy, D.Kushal Goud, K. Naveen, K. T. Reddy","doi":"10.1109/ICSMDI57622.2023.00071","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00071","url":null,"abstract":"The advancement in wireless communication technology has led to various security challenges in networks. To combat these issues, Network Intrusion Detection Systems (NIDS) are employed to identify attacks. To enhance their accuracy in detecting intruders, various machine learning techniques have been previously used with NIDS. This paper presents a new approach that utilizes machine learning techniques to identify intrusions. The findings of our model indicate that it outperforms other methods, such as Naive Bayes, in terms of accuracy. Our method resulted in a performance time of 1.26 minutes, an accuracy rate of 97.38%, and an error rate of 0.25%.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114446648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Site Request Forgery as an Example of Machine Learning for Web Vulnerability Detection 跨站请求伪造作为Web漏洞检测机器学习的一个例子
Pub Date : 2023-03-01 DOI: 10.1109/ICSMDI57622.2023.00080
M. S. Rao, Birudugadda Kalyani, Baswani Vathsalya, Karri Dhanunjay, Alasandalapalli Lakshmi Narayana
This paper presents a strategy for discovering flaws in web applications through Machine Learning (ML). Web-based applications are especially troublesome to examine attributed to their variety and extensive usage of custom development methodologies. As little more than a basis, machine learning is extremely useful in website safety: It just might combine cognitive knowledge of web app terminology with automated software approaches based on verbally reported information. Mitch tool is the foremost machine learning strategy towards black-box investigation for Cross-Site Request Forgery (C.S.R.F) problems, was built using these principles. Mitch-helped us find Thirty-five recently developed cross-site request forgeries (C.S.R. Fs) in twenty wide fields, together with 3 main C.S.R. Fs in industry applications.
本文提出了一种通过机器学习(ML)发现web应用程序缺陷的策略。由于基于web的应用程序的多样性和定制开发方法的广泛使用,检查它们特别麻烦。作为一个基础,机器学习在网站安全方面非常有用:它可能将web应用术语的认知知识与基于口头报告信息的自动化软件方法结合起来。Mitch工具是针对跨站点请求伪造(C.S.R.F)问题的黑箱调查的最重要的机器学习策略,它是使用这些原则构建的。mitch帮助我们在20个广泛的领域找到了35个最近开发的跨站点请求伪造(C.S.R. Fs),以及3个主要的工业应用C.S.R. Fs。
{"title":"Cross-Site Request Forgery as an Example of Machine Learning for Web Vulnerability Detection","authors":"M. S. Rao, Birudugadda Kalyani, Baswani Vathsalya, Karri Dhanunjay, Alasandalapalli Lakshmi Narayana","doi":"10.1109/ICSMDI57622.2023.00080","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00080","url":null,"abstract":"This paper presents a strategy for discovering flaws in web applications through Machine Learning (ML). Web-based applications are especially troublesome to examine attributed to their variety and extensive usage of custom development methodologies. As little more than a basis, machine learning is extremely useful in website safety: It just might combine cognitive knowledge of web app terminology with automated software approaches based on verbally reported information. Mitch tool is the foremost machine learning strategy towards black-box investigation for Cross-Site Request Forgery (C.S.R.F) problems, was built using these principles. Mitch-helped us find Thirty-five recently developed cross-site request forgeries (C.S.R. Fs) in twenty wide fields, together with 3 main C.S.R. Fs in industry applications.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128293601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 3rd International Conference on Smart Data Intelligence (ICSMDI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1