首页 > 最新文献

2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)最新文献

英文 中文
Analyzing Credit Card Fraud Detection based on Machine Learning Models 基于机器学习模型的信用卡欺诈检测分析
Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795737
Raghad Almutairi, Abhishek Godavarthi, Arthi Reddy Kotha, Ebrima N. Ceesay
Credit card use is not always the best way to use for payments, but the most demonstrable payment mode is through the credit card for both offline as well as for online payments, which can result in deficit of funds. As the online shopping is booming it helps in rendering the cashless payment modes. It can be used at shopping’s, paying rent, paying utilities bill, internet bill, travel and transportation, entertainment, food. Using for all these things there is a chance of fraud transactions for a credit card, hence there is more risk. There are many types of fraudulent detections most of the banks and institutions are preferring fraud detection applications.it has become very hard to find out the fraud detections, After the transaction is done there is a chance of detecting fraudulent transactions in the manual business processing system. In real time the bunco transactions are done with real transactions, but it seems not to be sufficient for detecting [1]. Machine learning and data science both are playing a very important role in identifying the fraud detections. This study uses data science and machine learning for detecting the fraud detection to demonstrate various modellings. The problem enables the transactions of the previously done transaction data.
使用信用卡并不总是最好的支付方式,但最明显的支付方式是通过信用卡进行离线和在线支付,这可能导致资金赤字。随着网上购物的蓬勃发展,它有助于实现无现金支付模式。它可以用于购物,支付租金,支付水电费,互联网账单,旅游和交通,娱乐,食品。使用所有这些东西都有可能发生信用卡欺诈交易,因此风险更大。有许多类型的欺诈检测,大多数银行和机构更喜欢欺诈检测应用程序。在交易完成后,在人工业务处理系统中有可能发现欺诈交易,因此很难发现欺诈检测。在实时中,bunco交易是用真实的交易完成的,但似乎不足以检测[1]。机器学习和数据科学在识别欺诈检测方面都发挥着非常重要的作用。本研究使用数据科学和机器学习来检测欺诈检测,以演示各种模型。该问题支持先前完成的事务数据的事务。
{"title":"Analyzing Credit Card Fraud Detection based on Machine Learning Models","authors":"Raghad Almutairi, Abhishek Godavarthi, Arthi Reddy Kotha, Ebrima N. Ceesay","doi":"10.1109/iemtronics55184.2022.9795737","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795737","url":null,"abstract":"Credit card use is not always the best way to use for payments, but the most demonstrable payment mode is through the credit card for both offline as well as for online payments, which can result in deficit of funds. As the online shopping is booming it helps in rendering the cashless payment modes. It can be used at shopping’s, paying rent, paying utilities bill, internet bill, travel and transportation, entertainment, food. Using for all these things there is a chance of fraud transactions for a credit card, hence there is more risk. There are many types of fraudulent detections most of the banks and institutions are preferring fraud detection applications.it has become very hard to find out the fraud detections, After the transaction is done there is a chance of detecting fraudulent transactions in the manual business processing system. In real time the bunco transactions are done with real transactions, but it seems not to be sufficient for detecting [1]. Machine learning and data science both are playing a very important role in identifying the fraud detections. This study uses data science and machine learning for detecting the fraud detection to demonstrate various modellings. The problem enables the transactions of the previously done transaction data.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125171888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knee and Ankle Exoskeletons for Motor Rehabilitation: A Technology Review 膝关节和踝关节外骨骼用于运动康复:技术综述
Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795725
Deyby Huamanchahua, Cesar Luciano Otarola-Ruiz, Ana Quispe-Pina, Elvis J. De La Torre-Velarde
Exoskeletons have been around since 1890 when a passive device was developed to assist movement. Although the exoskeleton initially focused on the whole body, it has become increasingly focused on a more specific area, which makes rehabilitation work more feasible and, consequently, less costly. Therefore, the purpose of the article is to present a systematic review of trends in the technical area of knee and ankle exoskeletons for rehabilitation purposes. The objective is to provide the interested researcher with a structured matrix that integrates essential components and mechanisms in the development of knee and ankle exoskeletons. As a methodology, specialized databases in biomechanics were used that aided in the collection of research conducted between 2019 and 2022. The filtering process resulted in the selection of 37 investigations. Finally, it was concluded that innovations in exoskeletons contribute to patient rehabilitation and that there is still room for further improvement in the implementation of projects on a commercial scale and the development of new exoskeletons based on previous research.
自1890年以来,外骨骼一直存在,当时开发了一种辅助运动的被动装置。虽然外骨骼最初专注于整个身体,但它越来越多地专注于更具体的区域,这使得康复工作更可行,因此成本更低。因此,本文的目的是对用于康复目的的膝关节和踝关节外骨骼技术领域的趋势进行系统回顾。目的是为感兴趣的研究人员提供一个结构化的矩阵,该矩阵集成了膝关节和踝关节外骨骼发育的基本组件和机制。作为一种方法,使用了生物力学专业数据库,帮助收集了2019年至2022年期间进行的研究。筛选过程选出了37项调查。最后,我们得出结论,外骨骼的创新有助于患者康复,在商业规模的项目实施和基于先前研究的新型外骨骼开发方面仍有进一步改进的空间。
{"title":"Knee and Ankle Exoskeletons for Motor Rehabilitation: A Technology Review","authors":"Deyby Huamanchahua, Cesar Luciano Otarola-Ruiz, Ana Quispe-Pina, Elvis J. De La Torre-Velarde","doi":"10.1109/iemtronics55184.2022.9795725","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795725","url":null,"abstract":"Exoskeletons have been around since 1890 when a passive device was developed to assist movement. Although the exoskeleton initially focused on the whole body, it has become increasingly focused on a more specific area, which makes rehabilitation work more feasible and, consequently, less costly. Therefore, the purpose of the article is to present a systematic review of trends in the technical area of knee and ankle exoskeletons for rehabilitation purposes. The objective is to provide the interested researcher with a structured matrix that integrates essential components and mechanisms in the development of knee and ankle exoskeletons. As a methodology, specialized databases in biomechanics were used that aided in the collection of research conducted between 2019 and 2022. The filtering process resulted in the selection of 37 investigations. Finally, it was concluded that innovations in exoskeletons contribute to patient rehabilitation and that there is still room for further improvement in the implementation of projects on a commercial scale and the development of new exoskeletons based on previous research.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126962018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Monitoring System for Respiratory Diagnosis 呼吸诊断监测系统的设计
Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795832
Kamran Hameed, Sana Ijlal Shahrukh, I. S. Ateeq
Respiration is an important vital sign which can help in the indication of human’s health status. Sleep apnea, which is defined as a cessation of breathing while sleeping, is recognized as a common and critical popular health problem. By monitoring the patient’s respiration rate, sleep apnea can be diagnosed. The received signal from the patient, which is a variation in temperature, is converted into a variation in voltage and then the respiration rate can be calculated. A portable device is proposed that can continuously monitor the breathing rhythm in a manner which is fast, safe and costly effective. The system consists of a nasal-oral thermistor that is mounted inside a nebulizer mask for detecting the irregular respiratory interruption and providing audible and visual alarms when this interrupt indicates an apnea event. Otherwise, if an out-of-range value occurred the alarm also will be initiated. Thus, the device will contribute to reducing the death associated with sleep apnea.
呼吸是一项重要的生命体征,可以帮助指示人体的健康状况。睡眠呼吸暂停被定义为睡眠时呼吸停止,被认为是一种常见的、严重的健康问题。通过监测病人的呼吸频率,可以诊断睡眠呼吸暂停。从病人那里接收到的温度变化的信号被转换成电压的变化,然后就可以计算出呼吸速率。提出了一种快速、安全、经济、有效的便携式呼吸节律连续监测装置。该系统由一个鼻-口热敏电阻组成,该热敏电阻安装在雾化器面罩内,用于检测不规则的呼吸中断,并在这种中断表明呼吸暂停事件时提供声音和视觉警报。否则,如果出现超出范围的值,也会触发告警。因此,该设备将有助于减少与睡眠呼吸暂停相关的死亡。
{"title":"Design of Monitoring System for Respiratory Diagnosis","authors":"Kamran Hameed, Sana Ijlal Shahrukh, I. S. Ateeq","doi":"10.1109/iemtronics55184.2022.9795832","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795832","url":null,"abstract":"Respiration is an important vital sign which can help in the indication of human’s health status. Sleep apnea, which is defined as a cessation of breathing while sleeping, is recognized as a common and critical popular health problem. By monitoring the patient’s respiration rate, sleep apnea can be diagnosed. The received signal from the patient, which is a variation in temperature, is converted into a variation in voltage and then the respiration rate can be calculated. A portable device is proposed that can continuously monitor the breathing rhythm in a manner which is fast, safe and costly effective. The system consists of a nasal-oral thermistor that is mounted inside a nebulizer mask for detecting the irregular respiratory interruption and providing audible and visual alarms when this interrupt indicates an apnea event. Otherwise, if an out-of-range value occurred the alarm also will be initiated. Thus, the device will contribute to reducing the death associated with sleep apnea.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133807239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Cognitive Dynamic Systems and Its Overarching Functions 认知动力系统及其总体功能综述
Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795764
W. Hilal, Alessandro Giuliano, S. Gadsden, J. Yawney
Cognitive dynamic systems are a new field of physical systems inspired by several areas of study such as neuroscience, cognitive science, computer science, mathematics, physics and engineering. Building on Fuster’s paradigm, a system is considered cognitive when it is capable of five fundamental processes to human cognition: the perception-action cycle, memory, attention, intelligence and language. With these capabilities, a cognitive dynamic system can sense its environment, interact with it, and learn from it through continued interactions. The goal of this paper is to provide a thorough review of the cognitive dynamic system framework, along with its theory, applications, and its two special functions: cognitive control and cognitive risk control.
认知动态系统是受神经科学、认知科学、计算机科学、数学、物理学和工程学等多个研究领域的启发而形成的物理系统的一个新领域。在福斯特范式的基础上,当一个系统能够完成人类认知的五个基本过程时,它就被认为是认知的:感知-行动循环、记忆、注意力、智力和语言。有了这些能力,认知动态系统可以感知环境,与之互动,并通过持续的互动从中学习。本文旨在对认知动态系统框架及其理论、应用、认知控制和认知风险控制两种特殊功能进行综述。
{"title":"A Review of Cognitive Dynamic Systems and Its Overarching Functions","authors":"W. Hilal, Alessandro Giuliano, S. Gadsden, J. Yawney","doi":"10.1109/iemtronics55184.2022.9795764","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795764","url":null,"abstract":"Cognitive dynamic systems are a new field of physical systems inspired by several areas of study such as neuroscience, cognitive science, computer science, mathematics, physics and engineering. Building on Fuster’s paradigm, a system is considered cognitive when it is capable of five fundamental processes to human cognition: the perception-action cycle, memory, attention, intelligence and language. With these capabilities, a cognitive dynamic system can sense its environment, interact with it, and learn from it through continued interactions. The goal of this paper is to provide a thorough review of the cognitive dynamic system framework, along with its theory, applications, and its two special functions: cognitive control and cognitive risk control.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114682543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and analysis types of DDoS attack DDoS攻击类型检测与分析
Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795729
E. Navruzov, A. Kabulov
The problem of detecting types of DDOS attacks in large-scale networks is considered. The complexity of detection is explained by the presence of a large number of connected and diverse devices, the high volume of incoming traffic, the need to introduce special restrictions when searching for anomalies. The technology of developing information security models using data mining (DM) methods is proposed. The features of machine learning of DM algorithms are related to the choice of methods for preprocessing big data (Big Data). A technique for analyzing the structure of relations between types of DDOS attacks has been developed. Within the framework of this technique, a procedure for pairwise comparison of data by types of attacks with normal traffic is implemented. The result of the comparison is the stability of features, the values of which are invariant to the measurement scales. The analysis of the structure of relations by grouping algorithms was carried out according to the stability values on the determined sets of features. When forming the sets, the stability ranking was used. For classification, various existing methods of machine learning are analyzed.
研究了大规模网络中DDOS攻击类型的检测问题。检测的复杂性是由于存在大量连接和不同的设备,大量的传入流量,以及在搜索异常时需要引入特殊限制。提出了利用数据挖掘方法开发信息安全模型的技术。DM算法的机器学习特性与预处理大数据(big data)的方法选择有关。本文提出了一种分析DDOS攻击类型之间关系结构的技术。在该技术的框架内,实现了按攻击类型与正常流量进行数据两两比较的过程。比较的结果是特征的稳定性,其值对测量尺度是不变的。根据确定的特征集上的稳定性值,采用分组算法对关系结构进行分析。在形成集合时,采用稳定性排序。对于分类,分析了现有的各种机器学习方法。
{"title":"Detection and analysis types of DDoS attack","authors":"E. Navruzov, A. Kabulov","doi":"10.1109/iemtronics55184.2022.9795729","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795729","url":null,"abstract":"The problem of detecting types of DDOS attacks in large-scale networks is considered. The complexity of detection is explained by the presence of a large number of connected and diverse devices, the high volume of incoming traffic, the need to introduce special restrictions when searching for anomalies. The technology of developing information security models using data mining (DM) methods is proposed. The features of machine learning of DM algorithms are related to the choice of methods for preprocessing big data (Big Data). A technique for analyzing the structure of relations between types of DDOS attacks has been developed. Within the framework of this technique, a procedure for pairwise comparison of data by types of attacks with normal traffic is implemented. The result of the comparison is the stability of features, the values of which are invariant to the measurement scales. The analysis of the structure of relations by grouping algorithms was carried out according to the stability values on the determined sets of features. When forming the sets, the stability ranking was used. For classification, various existing methods of machine learning are analyzed.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115280435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
The Iso-RSA Cryptographic Scheme Iso-RSA加密方案
Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795732
Mamadou I. Wade
This paper shows one way that can be used to strengthen the RSA cryptographic scheme which was published in 1978 by Ron Rivest, Adi Shamir, and Len Adleman. We use the isonumber theory of the first kind which was developed by Santilli where the unit one of normal arithmetic is replaced with a new unit called an isounit. The proposed cryptosystem possesses both characteristics of symmetric and asymmetric encryption and therefore can be seen as a hybrid public-key and private-key cryptographic system that benefits from both types of the cryptographic method with a substantial increase in security of the associated ciphers. Additionally, applications and implementations of the Iso-RSA cryptosystem for the encryption and decryption of information encoded into positive integers or binary digits of 0s or 1s are implemented, and simulation results show that our proposed cryptographic system produces highly secure encrypted information. A wide range of other applications in security mechanisms and security services which include data confidentiality, authentications, data integrity, digital signature, key exchange, and others can be implemented using our proposed Iso-RSA cryptographic scheme.
本文展示了一种可以用来增强由Ron Rivest、Adi Shamir和Len Adleman于1978年发表的RSA加密方案的方法。我们使用由Santilli提出的第一类等数理论,其中普通算术的单位1被称为等单位的新单位所取代。所提出的密码系统同时具有对称和非对称加密的特征,因此可以看作是一种混合公钥和私钥加密系统,它受益于两种类型的加密方法,并大大提高了相关密码的安全性。此外,还实现了Iso-RSA密码系统对编码为正整数或0或1二进制数的信息进行加密和解密的应用和实现,仿真结果表明,我们提出的密码系统产生了高度安全的加密信息。安全机制和安全服务的广泛其他应用,包括数据机密性、身份验证、数据完整性、数字签名、密钥交换等,都可以使用我们提出的Iso-RSA加密方案来实现。
{"title":"The Iso-RSA Cryptographic Scheme","authors":"Mamadou I. Wade","doi":"10.1109/iemtronics55184.2022.9795732","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795732","url":null,"abstract":"This paper shows one way that can be used to strengthen the RSA cryptographic scheme which was published in 1978 by Ron Rivest, Adi Shamir, and Len Adleman. We use the isonumber theory of the first kind which was developed by Santilli where the unit one of normal arithmetic is replaced with a new unit called an isounit. The proposed cryptosystem possesses both characteristics of symmetric and asymmetric encryption and therefore can be seen as a hybrid public-key and private-key cryptographic system that benefits from both types of the cryptographic method with a substantial increase in security of the associated ciphers. Additionally, applications and implementations of the Iso-RSA cryptosystem for the encryption and decryption of information encoded into positive integers or binary digits of 0s or 1s are implemented, and simulation results show that our proposed cryptographic system produces highly secure encrypted information. A wide range of other applications in security mechanisms and security services which include data confidentiality, authentications, data integrity, digital signature, key exchange, and others can be implemented using our proposed Iso-RSA cryptographic scheme.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122607947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bangla Handwritten Character Recognition Method 孟加拉手写体字符识别方法
Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795820
L. Nahar
Recognizing and extracting handwritten character information is still a challenge in the scanning process. This research describes a method for OCR applications where Bengali handwritten characters can be recognized effectively. This method mainly focuses on post processing steps like feature extraction and building classification model to find a favorable accuracy rate. For feature extraction LBP method is used. Local Binary Pattern is a coming of age feature extracting method which is applied very few times in Bengali Language. This work is also an experimental approach of confirming what occurs when LBP is used in Bengali Characters. To classify Random Forest algorithm is applied, which is also a unique classification method. The datasets are gathered by collecting Bengali characters written in various fashions. Initially, scanned images of Bengali characters are given as input and by applying LBP required features are extracted. Principal Component Analysis (PCA) is applied on the collected feature vectors to reduce the dimension. Finally, RF algorithm is implied on the output to generate a recognition rate. Support vector machine (SVM) is also used as a classifier to evaluate and compare.
在扫描过程中,手写字符信息的识别和提取仍然是一个挑战。本研究描述了一种有效识别孟加拉手写体字符的OCR方法。该方法主要通过特征提取和分类模型的建立等后处理步骤来寻找较好的准确率。特征提取采用LBP方法。局部二值模式是一种新兴的特征提取方法,在孟加拉语中应用的次数很少。这项工作也是一种实验方法,以确认在孟加拉汉字中使用LBP时发生了什么。分类采用随机森林算法,这也是一种独特的分类方法。这些数据集是通过收集以各种方式书写的孟加拉字符而收集的。首先,将孟加拉字符的扫描图像作为输入,并通过应用LBP提取所需的特征。对采集到的特征向量进行主成分分析(PCA)降维。最后,在输出中隐含射频算法来生成识别率。支持向量机(SVM)也被用作分类器来评估和比较。
{"title":"Bangla Handwritten Character Recognition Method","authors":"L. Nahar","doi":"10.1109/iemtronics55184.2022.9795820","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795820","url":null,"abstract":"Recognizing and extracting handwritten character information is still a challenge in the scanning process. This research describes a method for OCR applications where Bengali handwritten characters can be recognized effectively. This method mainly focuses on post processing steps like feature extraction and building classification model to find a favorable accuracy rate. For feature extraction LBP method is used. Local Binary Pattern is a coming of age feature extracting method which is applied very few times in Bengali Language. This work is also an experimental approach of confirming what occurs when LBP is used in Bengali Characters. To classify Random Forest algorithm is applied, which is also a unique classification method. The datasets are gathered by collecting Bengali characters written in various fashions. Initially, scanned images of Bengali characters are given as input and by applying LBP required features are extracted. Principal Component Analysis (PCA) is applied on the collected feature vectors to reduce the dimension. Finally, RF algorithm is implied on the output to generate a recognition rate. Support vector machine (SVM) is also used as a classifier to evaluate and compare.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126444535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Devices Proximity Authentication In Ad Hoc Network Environment Ad Hoc网络环境下的物联网设备近距离认证
Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795787
A. A. AlQahtani, Hosam Alamleh, Baker Al Smadi
Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g., vehicles, home appliances sensors, actuators, etc.), known as Things, to connect and exchange data, more importantly, without human interaction. Since IoT plays a significant role in our daily lives, we must secure the IoT environment to work effectively. Among the various security requirements, authentication to the IoT devices is essential as it is the first step in preventing any negative impact of possible attackers. Using the current IEEE 802.11 infrastructure, this paper implements an IoT devices authentication scheme based on something that is in the IoT device’s environment (i.e., ambient access points). Data from the broadcast messages (i.e., beacon frame characteristics) are utilized to implement the authentication factor that confirms proximity between two devices in an ad hoc IoT network.
物联网(IoT)是一种分布式通信技术系统,它为物理设备(例如,车辆,家用电器传感器,执行器等)提供了连接和交换数据的可能性,更重要的是,无需人工交互。由于物联网在我们的日常生活中发挥着重要作用,我们必须确保物联网环境有效工作。在各种安全要求中,对物联网设备进行身份验证是必不可少的,因为这是防止可能的攻击者产生任何负面影响的第一步。使用当前的IEEE 802.11基础架构,本文实现了一个基于物联网设备环境(即环境接入点)的物联网设备身份验证方案。来自广播消息的数据(即信标帧特征)被用来实现认证因素,以确认自组织物联网网络中两个设备之间的接近程度。
{"title":"IoT Devices Proximity Authentication In Ad Hoc Network Environment","authors":"A. A. AlQahtani, Hosam Alamleh, Baker Al Smadi","doi":"10.1109/iemtronics55184.2022.9795787","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795787","url":null,"abstract":"Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices (e.g., vehicles, home appliances sensors, actuators, etc.), known as Things, to connect and exchange data, more importantly, without human interaction. Since IoT plays a significant role in our daily lives, we must secure the IoT environment to work effectively. Among the various security requirements, authentication to the IoT devices is essential as it is the first step in preventing any negative impact of possible attackers. Using the current IEEE 802.11 infrastructure, this paper implements an IoT devices authentication scheme based on something that is in the IoT device’s environment (i.e., ambient access points). Data from the broadcast messages (i.e., beacon frame characteristics) are utilized to implement the authentication factor that confirms proximity between two devices in an ad hoc IoT network.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129622705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Simulating Software Support Delays in a 24/7 Environment Using Discrete Event Simulation 使用离散事件模拟在24/7环境中模拟软件支持延迟
Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795776
R. Kashef, Shabbir Mirza
Since there is a cost associated with providing 24/7 support, it is also common to divide user support into tiers where a group focused on usability and training of the software provides tier 1 support and another group, consisting of mainly developers, is focused on feature development, software bug fixing, and related issues work separately in a different tier. This paper focuses on software organizations where the developer tier operates from just one part of the world under a single time zone. This group is not available on a 24/7 basis, but the Tier 1 group works in different regions – and hence time zones - throughout the world to deal with user problems and questions. Users can be internal or external, depending on the purpose of the software. This paper discusses only internal users (developers, users and help desk employees who work for the same company) and the delays in support when dealing with these users who may be working in different regions and/or time zones. Tier 1 support is available around the clock due to hiring help desk resources in different locations under different time zones. If an issue cannot be resolved, the Tier 1 workers escalate the issue to the next tier (the developers), who work regular hours in one region under one time zone. This paper uses discrete event simulation modelling to provide insights for a company with a similar structure to better understand possible software support delays. These delays can be reduced, and better overall support can be provided in the future.
由于提供24/7的支持是有成本的,所以通常将用户支持划分为不同的层,其中专注于软件可用性和培训的组提供第1层支持,而主要由开发人员组成的另一组则专注于功能开发、软件错误修复和相关问题,在不同的层中单独工作。本文关注的是软件组织,在这些组织中,开发人员层只在一个时区的世界的一部分进行操作。这个小组不是24/7全天候可用,但是第一级小组在世界各地的不同地区(因此是时区)工作,以处理用户的问题和疑问。用户可以是内部的,也可以是外部的,这取决于软件的用途。本文仅讨论内部用户(为同一家公司工作的开发人员、用户和服务台员工)以及处理这些可能在不同地区和/或时区工作的用户时的支持延迟。由于在不同时区的不同位置雇用帮助台资源,因此可以全天候提供Tier 1支持。如果一个问题无法解决,一级工作人员将问题升级到下一级(开发人员),他们在一个时区的一个地区正常工作。本文使用离散事件模拟模型为具有类似结构的公司提供见解,以更好地理解可能的软件支持延迟。可以减少这些延迟,并在将来提供更好的整体支持。
{"title":"Simulating Software Support Delays in a 24/7 Environment Using Discrete Event Simulation","authors":"R. Kashef, Shabbir Mirza","doi":"10.1109/iemtronics55184.2022.9795776","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795776","url":null,"abstract":"Since there is a cost associated with providing 24/7 support, it is also common to divide user support into tiers where a group focused on usability and training of the software provides tier 1 support and another group, consisting of mainly developers, is focused on feature development, software bug fixing, and related issues work separately in a different tier. This paper focuses on software organizations where the developer tier operates from just one part of the world under a single time zone. This group is not available on a 24/7 basis, but the Tier 1 group works in different regions – and hence time zones - throughout the world to deal with user problems and questions. Users can be internal or external, depending on the purpose of the software. This paper discusses only internal users (developers, users and help desk employees who work for the same company) and the delays in support when dealing with these users who may be working in different regions and/or time zones. Tier 1 support is available around the clock due to hiring help desk resources in different locations under different time zones. If an issue cannot be resolved, the Tier 1 workers escalate the issue to the next tier (the developers), who work regular hours in one region under one time zone. This paper uses discrete event simulation modelling to provide insights for a company with a similar structure to better understand possible software support delays. These delays can be reduced, and better overall support can be provided in the future.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125094170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Provision of Information and Detection Systems on Two-Wheeled Motorcycle Accidents 提供两轮电单车意外资料及侦测系统
Pub Date : 2022-06-01 DOI: 10.1109/iemtronics55184.2022.9795807
Andi Nur Faisal, Amil Ahmad Ilham, Syafaruddin
This current work proposed the system of detection and information delivery on accident locations to related parties in order to get medical aids punctually. This system was based on three major components as the data source inputs, namely the censors of tilt/slope, vibration, acceleration, and coordinate locations. The data was then processed through Arduino microcontroller by applying a fuzzy logic algorithm using Tsukamoto method as a supporting system for accident status decision. The results of the decision were then transmitted to the data center in real time using the Wi-Fi module, and then send notifications to related parties. The test results revealed that the slope censor accuracy was about 96.1%. Additionally, the use of fuzzy logic via Tsukamoto method was successfully implemented to determine the accident status by an accuracy value of 85.18%.
本工作提出了事故现场检测与信息传递系统,以便及时获得医疗救助。该系统以倾斜/坡度传感器、振动传感器、加速度传感器和坐标位置传感器为数据源输入。然后通过Arduino单片机对数据进行处理,采用模糊逻辑算法,采用冢本法作为事故状态决策的支持系统。然后通过Wi-Fi模块将决策结果实时传输到数据中心,然后向相关方发送通知。试验结果表明,坡度传感器的精度约为96.1%。此外,通过Tsukamoto方法成功地实现了模糊逻辑对事故状态的确定,准确率达到85.18%。
{"title":"Provision of Information and Detection Systems on Two-Wheeled Motorcycle Accidents","authors":"Andi Nur Faisal, Amil Ahmad Ilham, Syafaruddin","doi":"10.1109/iemtronics55184.2022.9795807","DOIUrl":"https://doi.org/10.1109/iemtronics55184.2022.9795807","url":null,"abstract":"This current work proposed the system of detection and information delivery on accident locations to related parties in order to get medical aids punctually. This system was based on three major components as the data source inputs, namely the censors of tilt/slope, vibration, acceleration, and coordinate locations. The data was then processed through Arduino microcontroller by applying a fuzzy logic algorithm using Tsukamoto method as a supporting system for accident status decision. The results of the decision were then transmitted to the data center in real time using the Wi-Fi module, and then send notifications to related parties. The test results revealed that the slope censor accuracy was about 96.1%. Additionally, the use of fuzzy logic via Tsukamoto method was successfully implemented to determine the accident status by an accuracy value of 85.18%.","PeriodicalId":442879,"journal":{"name":"2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1