首页 > 最新文献

EAI Endorsed Transactions on Internet of Things最新文献

英文 中文
A Survey about Post Quantum Cryptography Methods 后量子加密方法概览
Pub Date : 2024-02-12 DOI: 10.4108/eetiot.5099
Jency Rubia J, Babitha Lincy R, E. Nithila, Sherin Shibi C, Rosi A
Cryptography is an art of hiding the significant data or information with some other codes. It is a practice and study of securing information and communication. Thus, cryptography prevents third party intervention over the data communication. The cryptography technology transforms the data into some other form to enhance security and robustness against the attacks. The thrust of enhancing the security among data transfer has been emerged ever since the need of Artificial Intelligence field came into a market. Therefore, modern way of computing cryptographic algorithm came into practice such as AES, 3DES, RSA, Diffie-Hellman and ECC. These public-key encryption techniques now in use are based on challenging discrete logarithms for elliptic curves and complex factorization. However, those two difficult problems can be effectively solved with the help of sufficient large-scale quantum computer. The Post Quantum Cryptography (PQC) aims to deal with an attacker who has a large-scale quantum computer. Therefore, it is essential to build a robust and secure cryptography algorithm against most vulnerable pre-quantum cryptography methods. That is called ‘Post Quantum Cryptography’. Therefore, the present crypto system needs to propose encryption key and signature size is very large.in addition to careful prediction of encryption/decryption time and amount of traffic over the communication wire is required. The post-quantum cryptography (PQC) article discusses different families of post-quantum cryptosystems, analyses the current status of the National Institute of Standards and Technology (NIST) post-quantum cryptography standardisation process, and looks at the difficulties faced by the PQC community.
密码学是一门用其他代码隐藏重要数据或信息的艺术。它是一种确保信息和通信安全的实践和研究。因此,密码学可以防止第三方干预数据通信。密码学技术将数据转换成其他形式,以提高安全性和抵御攻击的能力。自从人工智能领域进入市场以来,提高数据传输安全性的主旨就已经出现。因此,AES、3DES、RSA、Diffie-Hellman 和 ECC 等现代计算加密算法应运而生。目前使用的这些公钥加密技术都是基于具有挑战性的椭圆曲线离散对数和复因式分解。然而,在足够大规模的量子计算机的帮助下,这两个难题可以得到有效解决。后量子密码学(PQC)旨在应对拥有大规模量子计算机的攻击者。因此,必须建立一种稳健、安全的加密算法,以对抗最脆弱的前量子加密方法。这就是所谓的 "后量子密码学"。因此,目前的密码系统需要提出非常大的加密密钥和签名大小。此外,还需要仔细预测加密/解密时间和通信线路上的流量。后量子密码学(PQC)文章讨论了不同系列的后量子密码系统,分析了美国国家标准与技术研究院(NIST)后量子密码学标准化进程的现状,并探讨了后量子密码学界面临的困难。
{"title":"A Survey about Post Quantum Cryptography Methods","authors":"Jency Rubia J, Babitha Lincy R, E. Nithila, Sherin Shibi C, Rosi A","doi":"10.4108/eetiot.5099","DOIUrl":"https://doi.org/10.4108/eetiot.5099","url":null,"abstract":"Cryptography is an art of hiding the significant data or information with some other codes. It is a practice and study of securing information and communication. Thus, cryptography prevents third party intervention over the data communication. The cryptography technology transforms the data into some other form to enhance security and robustness against the attacks. The thrust of enhancing the security among data transfer has been emerged ever since the need of Artificial Intelligence field came into a market. Therefore, modern way of computing cryptographic algorithm came into practice such as AES, 3DES, RSA, Diffie-Hellman and ECC. These public-key encryption techniques now in use are based on challenging discrete logarithms for elliptic curves and complex factorization. However, those two difficult problems can be effectively solved with the help of sufficient large-scale quantum computer. The Post Quantum Cryptography (PQC) aims to deal with an attacker who has a large-scale quantum computer. Therefore, it is essential to build a robust and secure cryptography algorithm against most vulnerable pre-quantum cryptography methods. That is called ‘Post Quantum Cryptography’. Therefore, the present crypto system needs to propose encryption key and signature size is very large.in addition to careful prediction of encryption/decryption time and amount of traffic over the communication wire is required. The post-quantum cryptography (PQC) article discusses different families of post-quantum cryptosystems, analyses the current status of the National Institute of Standards and Technology (NIST) post-quantum cryptography standardisation process, and looks at the difficulties faced by the PQC community.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"61 34","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139844180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic sign recognition using CNN and Res-Net 使用 CNN 和 Res-Net 识别交通标志
Pub Date : 2024-02-12 DOI: 10.4108/eetiot.5098
J. Cruz Antony, G. M. Karpura Dheepan, Veena K, Vellanki Vikas, Vuppala Satyamitra
  In the realm of contemporary applications and everyday life, the significance of object recognition and classification cannot be overstated. A multitude of valuable domains, including G-lens technology, cancer prediction, Optical Character Recognition (OCR), Face Recognition, and more, heavily rely on the efficacy of image identification algorithms. Among these, Convolutional Neural Networks (CNN) have emerged as a cutting-edge technique that excels in its aptitude for feature extraction, offering pragmatic solutions to a diverse array of object recognition challenges. CNN's notable strength is underscored by its swifter execution, rendering it particularly advantageous for real-time processing. The domain of traffic sign recognition holds profound importance, especially in the development of practical applications like autonomous driving for vehicles such as Tesla, as well as in the realm of traffic surveillance. In this research endeavour, the focus was directed towards the Belgium Traffic Signs Dataset (BTS), an encompassing repository comprising a total of 62 distinct traffic signs. By employing a CNN model, a meticulously methodical approach was obtained commencing with a rigorous phase of data pre-processing. This preparatory stage was complemented by the strategic incorporation of residual blocks during model training, thereby enhancing the network's ability to glean intricate features from traffic sign images. Notably, our proposed methodology yielded a commendable accuracy rate of 94.25%, demonstrating the system's robust and proficient recognition capabilities. The distinctive prowess of our methodology shines through its substantial improvements in specific parameters compared to pre-existing techniques. Our approach thrives in terms of accuracy, capitalizing on CNN's rapid execution speed, and offering an efficient means of feature extraction. By effectively training on a diverse dataset encompassing 62 varied traffic signs, our model showcases a promising potential for real-world applications. The overarching analysis highlights the efficacy of our proposed technique, reaffirming its potency in achieving precise traffic sign recognition and positioning it as a viable solution for real-time scenarios and autonomous systems.
在当代应用和日常生活中,物体识别和分类的重要性无论怎样强调都不为过。包括 G-lens 技术、癌症预测、光学字符识别 (OCR)、人脸识别等在内的众多重要领域都严重依赖于图像识别算法的功效。其中,卷积神经网络(CNN)已成为一种尖端技术,在特征提取方面表现出色,为各种物体识别挑战提供了实用的解决方案。CNN 的显著优势在于其执行速度更快,特别适合实时处理。交通标志识别领域具有深远的意义,尤其是在开发自动驾驶汽车(如特斯拉)等实际应用以及交通监控领域。在这项研究工作中,重点放在了比利时交通标志数据集(BTS)上,这是一个包含 62 个不同交通标志的资料库。通过采用 CNN 模型,从严格的数据预处理阶段开始,获得了一套严谨的方法。在这一准备阶段,我们还在模型训练过程中战略性地加入了残差块,从而增强了网络从交通标志图像中收集复杂特征的能力。值得注意的是,我们提出的方法获得了令人称道的 94.25% 的准确率,证明了系统强大而熟练的识别能力。与现有技术相比,我们的方法在特定参数上有了很大改进,这充分体现了我们的独特能力。我们的方法充分利用了 CNN 的快速执行速度,并提供了一种高效的特征提取方法,从而在准确性方面取得了巨大进步。通过在包含 62 种不同交通标志的多样化数据集上进行有效训练,我们的模型展示了在现实世界中应用的巨大潜力。总体分析强调了我们提出的技术的有效性,再次证实了它在实现精确交通标志识别方面的潜力,并将其定位为实时场景和自主系统的可行解决方案。
{"title":"Traffic sign recognition using CNN and Res-Net","authors":"J. Cruz Antony, G. M. Karpura Dheepan, Veena K, Vellanki Vikas, Vuppala Satyamitra","doi":"10.4108/eetiot.5098","DOIUrl":"https://doi.org/10.4108/eetiot.5098","url":null,"abstract":"  \u0000In the realm of contemporary applications and everyday life, the significance of object recognition and classification cannot be overstated. A multitude of valuable domains, including G-lens technology, cancer prediction, Optical Character Recognition (OCR), Face Recognition, and more, heavily rely on the efficacy of image identification algorithms. Among these, Convolutional Neural Networks (CNN) have emerged as a cutting-edge technique that excels in its aptitude for feature extraction, offering pragmatic solutions to a diverse array of object recognition challenges. CNN's notable strength is underscored by its swifter execution, rendering it particularly advantageous for real-time processing. The domain of traffic sign recognition holds profound importance, especially in the development of practical applications like autonomous driving for vehicles such as Tesla, as well as in the realm of traffic surveillance. In this research endeavour, the focus was directed towards the Belgium Traffic Signs Dataset (BTS), an encompassing repository comprising a total of 62 distinct traffic signs. By employing a CNN model, a meticulously methodical approach was obtained commencing with a rigorous phase of data pre-processing. This preparatory stage was complemented by the strategic incorporation of residual blocks during model training, thereby enhancing the network's ability to glean intricate features from traffic sign images. Notably, our proposed methodology yielded a commendable accuracy rate of 94.25%, demonstrating the system's robust and proficient recognition capabilities. The distinctive prowess of our methodology shines through its substantial improvements in specific parameters compared to pre-existing techniques. Our approach thrives in terms of accuracy, capitalizing on CNN's rapid execution speed, and offering an efficient means of feature extraction. By effectively training on a diverse dataset encompassing 62 varied traffic signs, our model showcases a promising potential for real-world applications. The overarching analysis highlights the efficacy of our proposed technique, reaffirming its potency in achieving precise traffic sign recognition and positioning it as a viable solution for real-time scenarios and autonomous systems.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"119 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139785230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I-CVSSDM: IoT Enabled Computer Vision Safety System for Disaster Management I-CVSSDM:用于灾害管理的物联网计算机视觉安全系统
Pub Date : 2024-02-06 DOI: 10.4108/eetiot.5046
Parameswaran Ramesh, Vidhya N, Panjavarnam B, Shabana Parveen M, Deepak Athipan A M B, B. P. T. V
INTRODUCTION: Around the world, individuals experience flooding more frequently than any other natural calamity. OBJECTIVES: The motivation behind this research is to provide an Internet of Things (IoT)-based early warning assistive system to enable monitoring of water logging levels in flood-affected areas. Further, the SSD-MobiNET V2 model is used in the developed system to detect and classify the objects that prevail in the flood zone. METHODS: The developed research is validated in a real-time scenario. To enable this, a customized embedded module is designed and developed using the Raspberry Pi 4 model B processor. The module uses (i) a pi-camera to capture the objects and (ii) an ultrasonic sensor to measure the water level in the flood area. RESULTS: The measured data and detected objects are periodically ported to the cloud and stored in the cloud database to enable remote monitoring and further processing. CONCLUSION: Also, whenever the level of waterlogged exceeds the threshold, an alert is sent to the concerned authorities in the form of an SMS, a phone call, or an email.
引言:在世界各地,人们遭遇洪灾的频率高于其他自然灾害。目标:这项研究的动机是提供一个基于物联网(IoT)的预警辅助系统,以监测受洪水影响地区的积水程度。此外,开发的系统还使用了 SSD-MobiNET V2 模型来检测洪水区域内的物体并对其进行分类。方法:所开发的研究在实时场景中进行了验证。为此,使用 Raspberry Pi 4 B 型处理器设计和开发了一个定制的嵌入式模块。该模块使用(i) pi 摄像头捕捉物体,(ii) 超声波传感器测量洪水区域的水位。结果:测量到的数据和检测到的物体会定期移植到云端,并存储在云数据库中,以便进行远程监控和进一步处理。结论:此外,只要内涝水位超过阈值,就会以短信、电话或电子邮件的形式向有关部门发出警报。
{"title":"I-CVSSDM: IoT Enabled Computer Vision Safety System for Disaster Management","authors":"Parameswaran Ramesh, Vidhya N, Panjavarnam B, Shabana Parveen M, Deepak Athipan A M B, B. P. T. V","doi":"10.4108/eetiot.5046","DOIUrl":"https://doi.org/10.4108/eetiot.5046","url":null,"abstract":"INTRODUCTION: Around the world, individuals experience flooding more frequently than any other natural calamity. \u0000OBJECTIVES: The motivation behind this research is to provide an Internet of Things (IoT)-based early warning assistive system to enable monitoring of water logging levels in flood-affected areas. Further, the SSD-MobiNET V2 model is used in the developed system to detect and classify the objects that prevail in the flood zone. \u0000METHODS: The developed research is validated in a real-time scenario. To enable this, a customized embedded module is designed and developed using the Raspberry Pi 4 model B processor. The module uses (i) a pi-camera to capture the objects and (ii) an ultrasonic sensor to measure the water level in the flood area. \u0000RESULTS: The measured data and detected objects are periodically ported to the cloud and stored in the cloud database to enable remote monitoring and further processing. \u0000CONCLUSION: Also, whenever the level of waterlogged exceeds the threshold, an alert is sent to the concerned authorities in the form of an SMS, a phone call, or an email.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"71 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139801460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I-CVSSDM: IoT Enabled Computer Vision Safety System for Disaster Management I-CVSSDM:用于灾害管理的物联网计算机视觉安全系统
Pub Date : 2024-02-06 DOI: 10.4108/eetiot.5046
Parameswaran Ramesh, Vidhya N, Panjavarnam B, Shabana Parveen M, Deepak Athipan A M B, B. P. T. V
INTRODUCTION: Around the world, individuals experience flooding more frequently than any other natural calamity. OBJECTIVES: The motivation behind this research is to provide an Internet of Things (IoT)-based early warning assistive system to enable monitoring of water logging levels in flood-affected areas. Further, the SSD-MobiNET V2 model is used in the developed system to detect and classify the objects that prevail in the flood zone. METHODS: The developed research is validated in a real-time scenario. To enable this, a customized embedded module is designed and developed using the Raspberry Pi 4 model B processor. The module uses (i) a pi-camera to capture the objects and (ii) an ultrasonic sensor to measure the water level in the flood area. RESULTS: The measured data and detected objects are periodically ported to the cloud and stored in the cloud database to enable remote monitoring and further processing. CONCLUSION: Also, whenever the level of waterlogged exceeds the threshold, an alert is sent to the concerned authorities in the form of an SMS, a phone call, or an email.
引言:在世界各地,人们遭遇洪灾的频率高于其他自然灾害。目标:这项研究的动机是提供一个基于物联网(IoT)的预警辅助系统,以监测受洪水影响地区的积水程度。此外,开发的系统还使用了 SSD-MobiNET V2 模型来检测洪水区域内的物体并对其进行分类。方法:所开发的研究在实时场景中进行了验证。为此,使用 Raspberry Pi 4 B 型处理器设计和开发了一个定制的嵌入式模块。该模块使用(i) pi 摄像头捕捉物体,(ii) 超声波传感器测量洪水区域的水位。结果:测量到的数据和检测到的物体会定期移植到云端,并存储在云数据库中,以便进行远程监控和进一步处理。结论:此外,只要内涝水位超过阈值,就会以短信、电话或电子邮件的形式向有关部门发出警报。
{"title":"I-CVSSDM: IoT Enabled Computer Vision Safety System for Disaster Management","authors":"Parameswaran Ramesh, Vidhya N, Panjavarnam B, Shabana Parveen M, Deepak Athipan A M B, B. P. T. V","doi":"10.4108/eetiot.5046","DOIUrl":"https://doi.org/10.4108/eetiot.5046","url":null,"abstract":"INTRODUCTION: Around the world, individuals experience flooding more frequently than any other natural calamity. \u0000OBJECTIVES: The motivation behind this research is to provide an Internet of Things (IoT)-based early warning assistive system to enable monitoring of water logging levels in flood-affected areas. Further, the SSD-MobiNET V2 model is used in the developed system to detect and classify the objects that prevail in the flood zone. \u0000METHODS: The developed research is validated in a real-time scenario. To enable this, a customized embedded module is designed and developed using the Raspberry Pi 4 model B processor. The module uses (i) a pi-camera to capture the objects and (ii) an ultrasonic sensor to measure the water level in the flood area. \u0000RESULTS: The measured data and detected objects are periodically ported to the cloud and stored in the cloud database to enable remote monitoring and further processing. \u0000CONCLUSION: Also, whenever the level of waterlogged exceeds the threshold, an alert is sent to the concerned authorities in the form of an SMS, a phone call, or an email.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"138 1-3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139861522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning based Disease and Pest detection in Agricultural Crops 基于机器学习的农作物病虫害检测
Pub Date : 2024-02-06 DOI: 10.4108/eetiot.5049
Balasubramaniam S, Sandra Grace Nelson, Arishma M, Anjali S Rajan, Satheesh Kumar K
INTRODUCTION: Most Indians rely on agricultural work as their primary means of support, making it an essential part of the country’s economy. Disasters and the expected loss of farmland by 2050 as a result of global population expansion raise concerns about food security in that year and beyond. The Internet of Things (IoT), Big Data and Analytics are all examples of smart agricultural technologies that can help the farmers enhance their operation and make better decisions. OBJECTIVES: In this paper, machine learning based system has been developed for solving the problem of crop disease and pest prediction, focussing on the chilli crop as a case study. METHODS: The performance of the suggested system has been assessed by employing performance metrics like accuracy, Mean Squared Error (MSE), Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). RESULTS: The experimental results reveals that the proposed method obtained accuracy of 0.90, MSE of 0.37, MAE of 0.15, RMSE of 0.61 CONCLUSION: This model will predict pests and diseases and notify farmers using a combination of the Random Forest Classifier, the Ada Boost Classifier, the K Nearest Neighbour, and Logistic Regression. Random Forest is the most accurate model.
导言:大多数印度人以农业劳动为主要生活来源,因此农业是国家经济的重要组成部分。由于全球人口膨胀,预计到 2050 年将会发生灾害和农田流失,这引发了人们对 2050 年及以后粮食安全的担忧。物联网 (IoT)、大数据和分析技术都是智能农业技术的典范,可以帮助农民提高经营水平并做出更好的决策。目标:本文以辣椒作物为例,开发了基于机器学习的系统,用于解决作物病虫害预测问题。方法:通过使用准确率、平均平方误差(MSE)、平均绝对误差(MAE)和均方根误差(RMSE)等性能指标来评估所建议系统的性能。结果:实验结果表明,所提方法的准确率为 0.90,MSE 为 0.37,MAE 为 0.15,RMSE 为 0.61 结论:该模型将使用随机森林分类器、Ada Boost 分类器、K 近邻和逻辑回归组合预测病虫害并通知农民。随机森林是最准确的模型。
{"title":"Machine Learning based Disease and Pest detection in Agricultural Crops","authors":"Balasubramaniam S, Sandra Grace Nelson, Arishma M, Anjali S Rajan, Satheesh Kumar K","doi":"10.4108/eetiot.5049","DOIUrl":"https://doi.org/10.4108/eetiot.5049","url":null,"abstract":"INTRODUCTION: Most Indians rely on agricultural work as their primary means of support, making it an essential part of the country’s economy. Disasters and the expected loss of farmland by 2050 as a result of global population expansion raise concerns about food security in that year and beyond. The Internet of Things (IoT), Big Data and Analytics are all examples of smart agricultural technologies that can help the farmers enhance their operation and make better decisions. \u0000OBJECTIVES: In this paper, machine learning based system has been developed for solving the problem of crop disease and pest prediction, focussing on the chilli crop as a case study. \u0000METHODS: The performance of the suggested system has been assessed by employing performance metrics like accuracy, Mean Squared Error (MSE), Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). \u0000RESULTS: The experimental results reveals that the proposed method obtained accuracy of 0.90, MSE of 0.37, MAE of 0.15, RMSE of 0.61 \u0000CONCLUSION: This model will predict pests and diseases and notify farmers using a combination of the Random Forest Classifier, the Ada Boost Classifier, the K Nearest Neighbour, and Logistic Regression. Random Forest is the most accurate model.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"19 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139798754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning based Disease and Pest detection in Agricultural Crops 基于机器学习的农作物病虫害检测
Pub Date : 2024-02-06 DOI: 10.4108/eetiot.5049
Balasubramaniam S, Sandra Grace Nelson, Arishma M, Anjali S Rajan, Satheesh Kumar K
INTRODUCTION: Most Indians rely on agricultural work as their primary means of support, making it an essential part of the country’s economy. Disasters and the expected loss of farmland by 2050 as a result of global population expansion raise concerns about food security in that year and beyond. The Internet of Things (IoT), Big Data and Analytics are all examples of smart agricultural technologies that can help the farmers enhance their operation and make better decisions. OBJECTIVES: In this paper, machine learning based system has been developed for solving the problem of crop disease and pest prediction, focussing on the chilli crop as a case study. METHODS: The performance of the suggested system has been assessed by employing performance metrics like accuracy, Mean Squared Error (MSE), Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). RESULTS: The experimental results reveals that the proposed method obtained accuracy of 0.90, MSE of 0.37, MAE of 0.15, RMSE of 0.61 CONCLUSION: This model will predict pests and diseases and notify farmers using a combination of the Random Forest Classifier, the Ada Boost Classifier, the K Nearest Neighbour, and Logistic Regression. Random Forest is the most accurate model.
导言:大多数印度人以农业劳动为主要生活来源,因此农业是国家经济的重要组成部分。由于全球人口膨胀,预计到 2050 年将会发生灾害和农田流失,这引发了人们对 2050 年及以后粮食安全的担忧。物联网 (IoT)、大数据和分析技术都是智能农业技术的典范,可以帮助农民提高经营水平并做出更好的决策。目标:本文以辣椒作物为例,开发了基于机器学习的系统,用于解决作物病虫害预测问题。方法:通过使用准确率、平均平方误差(MSE)、平均绝对误差(MAE)和均方根误差(RMSE)等性能指标来评估所建议系统的性能。结果:实验结果表明,所提方法的准确率为 0.90,MSE 为 0.37,MAE 为 0.15,RMSE 为 0.61 结论:该模型将使用随机森林分类器、Ada Boost 分类器、K 近邻和逻辑回归组合预测病虫害并通知农民。随机森林是最准确的模型。
{"title":"Machine Learning based Disease and Pest detection in Agricultural Crops","authors":"Balasubramaniam S, Sandra Grace Nelson, Arishma M, Anjali S Rajan, Satheesh Kumar K","doi":"10.4108/eetiot.5049","DOIUrl":"https://doi.org/10.4108/eetiot.5049","url":null,"abstract":"INTRODUCTION: Most Indians rely on agricultural work as their primary means of support, making it an essential part of the country’s economy. Disasters and the expected loss of farmland by 2050 as a result of global population expansion raise concerns about food security in that year and beyond. The Internet of Things (IoT), Big Data and Analytics are all examples of smart agricultural technologies that can help the farmers enhance their operation and make better decisions. \u0000OBJECTIVES: In this paper, machine learning based system has been developed for solving the problem of crop disease and pest prediction, focussing on the chilli crop as a case study. \u0000METHODS: The performance of the suggested system has been assessed by employing performance metrics like accuracy, Mean Squared Error (MSE), Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). \u0000RESULTS: The experimental results reveals that the proposed method obtained accuracy of 0.90, MSE of 0.37, MAE of 0.15, RMSE of 0.61 \u0000CONCLUSION: This model will predict pests and diseases and notify farmers using a combination of the Random Forest Classifier, the Ada Boost Classifier, the K Nearest Neighbour, and Logistic Regression. Random Forest is the most accurate model.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"347 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139858581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Security in Public Key Cryptography: A Novel Approach Combining Gaussian Graceful Labeling and NTRU Public Key Cryptosystem 增强公钥密码学的安全性:结合高斯优雅标记和 NTRU 公钥密码系统的新方法
Pub Date : 2024-02-01 DOI: 10.4108/eetiot.4992
S. Kavitha, G. Jayalalitha, K. Sivaranjani
This research explores an encryption system that combines the Nth-degree Truncated Polynomial Ring Unit (NTRU) public key cryptosystem with Gaussian Graceful Labeling. This process assigns distinct labels to a graph's vertices, resulting in successive Gaussian integers. The NTRU method offers enhanced security and efficient key exchange. The communication encryption process depends on integers P, a, and b, with P being the largest prime number in the vertex labeling. The original receivers are the vertex labeling with the largest prime number coefficient, while all other receivers receive messages from the sender. A polynomial algebraic mixing system and a clustering principle based on the abecedarian probability proposition are used in NTRU encryption and decryption. The choice of relatively prime integers p and q in NTRU plays a role in the construction of polynomial rings used for encryption and decryption, with specific choices and properties designed to ensure scheme security.
这项研究探索了一种加密系统,它将 Nth 度截断多项式环单元(NTRU)公钥加密系统与高斯优雅标签(Gaussian Graceful Labeling)相结合。这一过程为图的顶点分配不同的标签,从而产生连续的高斯整数。NTRU 方法提供了更高的安全性和高效的密钥交换。通信加密过程取决于整数 P、a 和 b,其中 P 是顶点标记中最大的质数。原始接收者是具有最大质数系数的顶点标签,而其他所有接收者都从发送者那里接收信息。在 NTRU 加密和解密中使用了多项式代数混合系统和基于阿贝歇德概率命题的聚类原理。在 NTRU 中,相对素数 p 和 q 的选择对用于加密和解密的多项式环的构建起着重要作用,其特定选择和属性旨在确保方案的安全性。
{"title":"Enhanced Security in Public Key Cryptography: A Novel Approach Combining Gaussian Graceful Labeling and NTRU Public Key Cryptosystem","authors":"S. Kavitha, G. Jayalalitha, K. Sivaranjani","doi":"10.4108/eetiot.4992","DOIUrl":"https://doi.org/10.4108/eetiot.4992","url":null,"abstract":"This research explores an encryption system that combines the Nth-degree Truncated Polynomial Ring Unit (NTRU) public key cryptosystem with Gaussian Graceful Labeling. This process assigns distinct labels to a graph's vertices, resulting in successive Gaussian integers. The NTRU method offers enhanced security and efficient key exchange. The communication encryption process depends on integers P, a, and b, with P being the largest prime number in the vertex labeling. The original receivers are the vertex labeling with the largest prime number coefficient, while all other receivers receive messages from the sender. A polynomial algebraic mixing system and a clustering principle based on the abecedarian probability proposition are used in NTRU encryption and decryption. The choice of relatively prime integers p and q in NTRU plays a role in the construction of polynomial rings used for encryption and decryption, with specific choices and properties designed to ensure scheme security.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"21 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139813801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Security in Public Key Cryptography: A Novel Approach Combining Gaussian Graceful Labeling and NTRU Public Key Cryptosystem 增强公钥密码学的安全性:结合高斯优雅标记和 NTRU 公钥密码系统的新方法
Pub Date : 2024-02-01 DOI: 10.4108/eetiot.4992
S. Kavitha, G. Jayalalitha, K. Sivaranjani
This research explores an encryption system that combines the Nth-degree Truncated Polynomial Ring Unit (NTRU) public key cryptosystem with Gaussian Graceful Labeling. This process assigns distinct labels to a graph's vertices, resulting in successive Gaussian integers. The NTRU method offers enhanced security and efficient key exchange. The communication encryption process depends on integers P, a, and b, with P being the largest prime number in the vertex labeling. The original receivers are the vertex labeling with the largest prime number coefficient, while all other receivers receive messages from the sender. A polynomial algebraic mixing system and a clustering principle based on the abecedarian probability proposition are used in NTRU encryption and decryption. The choice of relatively prime integers p and q in NTRU plays a role in the construction of polynomial rings used for encryption and decryption, with specific choices and properties designed to ensure scheme security.
这项研究探索了一种加密系统,它将 Nth 度截断多项式环单元(NTRU)公钥加密系统与高斯优雅标签(Gaussian Graceful Labeling)相结合。这一过程为图的顶点分配不同的标签,从而产生连续的高斯整数。NTRU 方法提供了更高的安全性和高效的密钥交换。通信加密过程取决于整数 P、a 和 b,其中 P 是顶点标记中最大的质数。原始接收者是具有最大质数系数的顶点标签,而其他所有接收者都从发送者那里接收信息。在 NTRU 加密和解密中使用了多项式代数混合系统和基于阿贝歇德概率命题的聚类原理。在 NTRU 中,相对素数 p 和 q 的选择对用于加密和解密的多项式环的构建起着重要作用,其特定选择和属性旨在确保方案的安全性。
{"title":"Enhanced Security in Public Key Cryptography: A Novel Approach Combining Gaussian Graceful Labeling and NTRU Public Key Cryptosystem","authors":"S. Kavitha, G. Jayalalitha, K. Sivaranjani","doi":"10.4108/eetiot.4992","DOIUrl":"https://doi.org/10.4108/eetiot.4992","url":null,"abstract":"This research explores an encryption system that combines the Nth-degree Truncated Polynomial Ring Unit (NTRU) public key cryptosystem with Gaussian Graceful Labeling. This process assigns distinct labels to a graph's vertices, resulting in successive Gaussian integers. The NTRU method offers enhanced security and efficient key exchange. The communication encryption process depends on integers P, a, and b, with P being the largest prime number in the vertex labeling. The original receivers are the vertex labeling with the largest prime number coefficient, while all other receivers receive messages from the sender. A polynomial algebraic mixing system and a clustering principle based on the abecedarian probability proposition are used in NTRU encryption and decryption. The choice of relatively prime integers p and q in NTRU plays a role in the construction of polynomial rings used for encryption and decryption, with specific choices and properties designed to ensure scheme security.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"13 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139873735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMART REPELLER: A Smart system to prevent Rhesus Macaque Trespassing in Human Settlements and Agricultural Areas 智能驱赶器:防止猕猴闯入人类居住区和农业区的智能系统
Pub Date : 2024-01-10 DOI: 10.4108/eetiot.4809
Radha R, Balaji G, Anita X, Mridhula N
Rhesus macaque trespassing is a widespread problem where wild Rhesus macaque monkeys enter human settlements and agricultural areas, causing various issues such as property damage, food theft, and health risks to humans. These primates also cause significant economic losses by raiding crops, damaging plants, and disrupting the natural balance of the ecosystem. To address this problem, a research paper proposes a technology-based solution called Smart Repeller, which uses ultrasonic sound waves and Calcium Carbide Cannon, along with computer vision technology and artificial intelligence to detect the presence of monkeys and activate repelling mechanisms automatically. The proposed device eliminates the need for human intervention, making it efficient and cost-effective. Our paper aims to demonstrate the feasibility and effectiveness of the proposed device through experimental studies and simulations, with the ultimate goal of providing a practical and scalable solution to mitigate the problem of Rhesus macaque trespassing in human settlements and agricultural areas.
猕猴非法入侵是一个普遍存在的问题,野生猕猴进入人类居住区和农业区,造成各种问题,如财产损失、偷窃食物和危害人类健康。这些灵长类动物还通过抢夺农作物、破坏植物和破坏生态系统的自然平衡造成重大经济损失。为解决这一问题,一篇研究论文提出了一种名为智能驱赶器的技术解决方案,它利用超声波和碳化钙大炮以及计算机视觉技术和人工智能来检测猴子的存在并自动启动驱赶机制。拟议的装置无需人工干预,因此既高效又经济。我们的论文旨在通过实验研究和模拟来证明拟议装置的可行性和有效性,最终目标是提供一种实用且可扩展的解决方案,以缓解猕猴闯入人类住区和农业区的问题。
{"title":"SMART REPELLER: A Smart system to prevent Rhesus Macaque Trespassing in Human Settlements and Agricultural Areas","authors":"Radha R, Balaji G, Anita X, Mridhula N","doi":"10.4108/eetiot.4809","DOIUrl":"https://doi.org/10.4108/eetiot.4809","url":null,"abstract":"Rhesus macaque trespassing is a widespread problem where wild Rhesus macaque monkeys enter human settlements and agricultural areas, causing various issues such as property damage, food theft, and health risks to humans. These primates also cause significant economic losses by raiding crops, damaging plants, and disrupting the natural balance of the ecosystem. To address this problem, a research paper proposes a technology-based solution called Smart Repeller, which uses ultrasonic sound waves and Calcium Carbide Cannon, along with computer vision technology and artificial intelligence to detect the presence of monkeys and activate repelling mechanisms automatically. The proposed device eliminates the need for human intervention, making it efficient and cost-effective. Our paper aims to demonstrate the feasibility and effectiveness of the proposed device through experimental studies and simulations, with the ultimate goal of providing a practical and scalable solution to mitigate the problem of Rhesus macaque trespassing in human settlements and agricultural areas.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"12 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139439753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized recognition system in online shopping by using deep learning 利用深度学习的在线购物个性化识别系统
Pub Date : 2024-01-10 DOI: 10.4108/eetiot.4810
Manjula Devarakonda Venkata, Prashanth Donda, N. B. Madhavi, Pavitar Parkash Singh, A. Azhagu, Jaisudhan Pazhani, Shaik Rehana Banu
This study presents an effective monitoring system to watch the Buying Experience across multiple shop interactions based on the refinement of the information derived from physiological data and facial expressions. The system's efficacy in recognizing consumers' emotions and avoiding bias based on age, race, and evaluation gender in a pilot study. The system's data has been compared to the outcomes of conventional video analysis. The study's conclusions indicate that the suggested approach can aid in the analysis of consumer experience in a store setting.
本研究基于从生理数据和面部表情中提取的信息的改进,提出了一种有效的监测系统,用于在多次商店互动中观察购买体验。在一项试点研究中,该系统有效识别了消费者的情绪,避免了基于年龄、种族和评价性别的偏见。该系统的数据与传统的视频分析结果进行了比较。研究结论表明,建议的方法有助于分析消费者在商店环境中的体验。
{"title":"Personalized recognition system in online shopping by using deep learning","authors":"Manjula Devarakonda Venkata, Prashanth Donda, N. B. Madhavi, Pavitar Parkash Singh, A. Azhagu, Jaisudhan Pazhani, Shaik Rehana Banu","doi":"10.4108/eetiot.4810","DOIUrl":"https://doi.org/10.4108/eetiot.4810","url":null,"abstract":"This study presents an effective monitoring system to watch the Buying Experience across multiple shop interactions based on the refinement of the information derived from physiological data and facial expressions. The system's efficacy in recognizing consumers' emotions and avoiding bias based on age, race, and evaluation gender in a pilot study. The system's data has been compared to the outcomes of conventional video analysis. The study's conclusions indicate that the suggested approach can aid in the analysis of consumer experience in a store setting.","PeriodicalId":506477,"journal":{"name":"EAI Endorsed Transactions on Internet of Things","volume":"1 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139439268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EAI Endorsed Transactions on Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1