Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053509
Anil Hingmire, P. Bhaladhare
Controlling urban flooding is a difficult issue for municipal planners. In order to handle the calamity, current research has focused on flood prediction, detection, monitoring, and warning systems. This research study proposes the water sensitive storm water network model. Based on water sensitive storm water network model, the real-time urban flood control method is proposed. The approach is based on real time flood data for water catchments that were gathered by using sensors and autonomous smart controller. The methodology of a smart flood resilient system prevents the surface flood water and is scalable to smart cities, which employ real-time parameters to automatically control urban floods. The proposed method optimizes the action of actuators in the sub catchment area in terms of early control of flood water.
{"title":"Building a Smart City: A Conceptual Approach to Real-Time Urban Flood Control System","authors":"Anil Hingmire, P. Bhaladhare","doi":"10.1109/IDCIoT56793.2023.10053509","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053509","url":null,"abstract":"Controlling urban flooding is a difficult issue for municipal planners. In order to handle the calamity, current research has focused on flood prediction, detection, monitoring, and warning systems. This research study proposes the water sensitive storm water network model. Based on water sensitive storm water network model, the real-time urban flood control method is proposed. The approach is based on real time flood data for water catchments that were gathered by using sensors and autonomous smart controller. The methodology of a smart flood resilient system prevents the surface flood water and is scalable to smart cities, which employ real-time parameters to automatically control urban floods. The proposed method optimizes the action of actuators in the sub catchment area in terms of early control of flood water.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"141 1","pages":"759-764"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73082593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053455
Harsh Vardhan Bajaj, A. Nijanth, A. Linsie, M. Saravana Sanjhay
Security systems for lockers or vaults these days have been largely compromised. As technology advances, the possibility of robbery also increases. One of the most secure and widely used security systems is password protected. As with any devices that use a keypad for authentication or access, there is a risk that the password will be compromised by unscrupulous individual may deliberately observe your finger motions on the keyboard and attempt to predict your password or use the powder method to recognize fingerprints. This paper presents a smart security system with a shuffling keyboard to overcome the issues and reduce the thefts. This system also comprises solutions for robberies in case of hostage situations, attack on the large organizations, home thefts, and unauthorized vehicle access by activating smooth silent alert system. This system is built by using Micro controller with touch screen. The screen displays every message for the users understanding.
{"title":"Smart Security System using Shuffling Keypad with SOS System","authors":"Harsh Vardhan Bajaj, A. Nijanth, A. Linsie, M. Saravana Sanjhay","doi":"10.1109/IDCIoT56793.2023.10053455","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053455","url":null,"abstract":"Security systems for lockers or vaults these days have been largely compromised. As technology advances, the possibility of robbery also increases. One of the most secure and widely used security systems is password protected. As with any devices that use a keypad for authentication or access, there is a risk that the password will be compromised by unscrupulous individual may deliberately observe your finger motions on the keyboard and attempt to predict your password or use the powder method to recognize fingerprints. This paper presents a smart security system with a shuffling keyboard to overcome the issues and reduce the thefts. This system also comprises solutions for robberies in case of hostage situations, attack on the large organizations, home thefts, and unauthorized vehicle access by activating smooth silent alert system. This system is built by using Micro controller with touch screen. The screen displays every message for the users understanding.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"13 1","pages":"150-155"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81940687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053550
K. Bala, J. Paramesh, K. Elma, S. Santhanalakshmi
The Mobile Ad hoc network (MANET) is a kind of wireless communication network that is composed of several nodes which are highly movable throughout the various directions in the network. Due to nonexistence of infrastructure in the MANET, the nodes can interconnect with one another in a random fashion. The Intrusion Detection System (IDS) is an observing parameter which is used to identify the suspicious functioning in the network and intimates through alert to the security operation center. Based upon the constraints, the center examines the problem and solves the constraints using necessary steps and solution. The transformation of the gray hole attack. The important consequences in the wireless sensor network involves the grey hole attack. It is a revolution of the black hole attack. This leads to decrease the efficiency of the network. Thus, to overcome the various malicious attacks, the proposed system is implemented with fuzzy logic system to enhance the efficiency in the networking system.
{"title":"An Intrusion Detection System for MANET to Detect Gray Hole Attack using Fuzzy Logic System","authors":"K. Bala, J. Paramesh, K. Elma, S. Santhanalakshmi","doi":"10.1109/IDCIoT56793.2023.10053550","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053550","url":null,"abstract":"The Mobile Ad hoc network (MANET) is a kind of wireless communication network that is composed of several nodes which are highly movable throughout the various directions in the network. Due to nonexistence of infrastructure in the MANET, the nodes can interconnect with one another in a random fashion. The Intrusion Detection System (IDS) is an observing parameter which is used to identify the suspicious functioning in the network and intimates through alert to the security operation center. Based upon the constraints, the center examines the problem and solves the constraints using necessary steps and solution. The transformation of the gray hole attack. The important consequences in the wireless sensor network involves the grey hole attack. It is a revolution of the black hole attack. This leads to decrease the efficiency of the network. Thus, to overcome the various malicious attacks, the proposed system is implemented with fuzzy logic system to enhance the efficiency in the networking system.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"40 1","pages":"941-945"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81014835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053521
Arjun Dubey, Harmeet Singh, Simarpreet Kaur
OFs (Optical Fibers) are broadly used for information broadcast systems due to their extensive information-carrying capability and dielectric environment. The OFs network architectures that use several WLs (wavelengths) per OFs connect thousands of users in central, urban, or large-scale applications with a wide range of transmission speeds and capabilities. This article defines a detailed introduction to optical fiber networks and general phases of communication of OF (Optical Fiber) procedure. The taxonomy may be based on optical fibers such as; (i) Structure, (ii) number of modes, (iii) refractive index profile, (iv) dispersion, (v) signal processing capacity (vi) Polarization. After that, it explains the merits and demerits of optical fiber networks. They studied optical wireless communications applications such as SMs (shopping malls), UW (underwater), industries, etc. Several analyses with different optimization methods such as Genetic Algorithm (GA), Ant Colony Optimization (ACO), and Particle-Swarm Optimization (PSO) algorithms. An effective resource-allocation method is required to reduce the issue of EE (energy-efficiency) and improve the presentation of quality-of-services of the ONs (Optical Networks).
{"title":"Analysis on Different Optimization Methods, Applications, and Categories of Optical Fiber Networks: A Review","authors":"Arjun Dubey, Harmeet Singh, Simarpreet Kaur","doi":"10.1109/IDCIoT56793.2023.10053521","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053521","url":null,"abstract":"OFs (Optical Fibers) are broadly used for information broadcast systems due to their extensive information-carrying capability and dielectric environment. The OFs network architectures that use several WLs (wavelengths) per OFs connect thousands of users in central, urban, or large-scale applications with a wide range of transmission speeds and capabilities. This article defines a detailed introduction to optical fiber networks and general phases of communication of OF (Optical Fiber) procedure. The taxonomy may be based on optical fibers such as; (i) Structure, (ii) number of modes, (iii) refractive index profile, (iv) dispersion, (v) signal processing capacity (vi) Polarization. After that, it explains the merits and demerits of optical fiber networks. They studied optical wireless communications applications such as SMs (shopping malls), UW (underwater), industries, etc. Several analyses with different optimization methods such as Genetic Algorithm (GA), Ant Colony Optimization (ACO), and Particle-Swarm Optimization (PSO) algorithms. An effective resource-allocation method is required to reduce the issue of EE (energy-efficiency) and improve the presentation of quality-of-services of the ONs (Optical Networks).","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"37 1","pages":"578-583"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79971145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053514
Saleha Saudagar, Neha Kamtalwar, Harsh Karadbhajne, Mandar D. Karmarkar, H. Kendre, Ojas Ketkar
Data has been the most valued asset of any industry throughout the course of time. And with the advent of the Internet and virtual platforms, data exchange via text files or media files has been accelerated multiple folds. However, the increase in the amount of data exchange also makes private data more vulnerable to external attacks. Multiple methods have been implemented to ensure safe and reliable pathways of exchanging data like securing the network-line via a VPN or using enhanced communication protocols like FTP(File Transfer Protocol) or SMTP(Secured Mail Transfer Protocol). Even though there have been mulitple methods to secure data transfer ways, the actual data still remains vulnerable and ready to use should these systems get overridden. Instead, a better method might be to actually encrypt the data and ensure that the main data stays independently secure apart from the secure pathways created. To address this specific issue, this paper proposes a system developed purely using java algorithms that can encrypt media files and decrypt them to protect the data they contain. Three different types of algorithms are applied to protect various types of files like mp4, png, jpg, pdf, doc, xml, etc.
{"title":"File Encryption-Decryption using Java","authors":"Saleha Saudagar, Neha Kamtalwar, Harsh Karadbhajne, Mandar D. Karmarkar, H. Kendre, Ojas Ketkar","doi":"10.1109/IDCIoT56793.2023.10053514","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053514","url":null,"abstract":"Data has been the most valued asset of any industry throughout the course of time. And with the advent of the Internet and virtual platforms, data exchange via text files or media files has been accelerated multiple folds. However, the increase in the amount of data exchange also makes private data more vulnerable to external attacks. Multiple methods have been implemented to ensure safe and reliable pathways of exchanging data like securing the network-line via a VPN or using enhanced communication protocols like FTP(File Transfer Protocol) or SMTP(Secured Mail Transfer Protocol). Even though there have been mulitple methods to secure data transfer ways, the actual data still remains vulnerable and ready to use should these systems get overridden. Instead, a better method might be to actually encrypt the data and ensure that the main data stays independently secure apart from the secure pathways created. To address this specific issue, this paper proposes a system developed purely using java algorithms that can encrypt media files and decrypt them to protect the data they contain. Three different types of algorithms are applied to protect various types of files like mp4, png, jpg, pdf, doc, xml, etc.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"164 1","pages":"855-859"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80353519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Land is an asset and the transfer of ownership of a piece of land from one party to another is an important as well as tedious task. Not only it involves hectic paperwork but also several middlemen and multiple verifications at various levels of the process. This makes the whole process less reliable and increases the chances of forgery multifold. Also, it’s difficult to find out the previous transfers. This problem can be easily taken care of by using blockchain for the land registration system. This will decrease corruption in the process by removing middlemen from the process. Also, it will increase the speed, and create trust in the system without even the involvement of any central agency. Blockchain is a decentralized, immutable ledger that keeps track of every legitimate transaction. It uses cryptographic techniques, consensus mechanisms, and hashing algorithms to maintain the chain of transactions. This keeps the whole system transparent and immutable. The aim of this work is to develop a user-friendly, blockchain-based land registration system to ease the process while maintaining security and trust. In places like India where lacs of transfers are done on a regular basis, the quantity of paper used to maintain the records is also very high. Not only will this system bring common people closer to technology, but it will also help protect the environment by removing manual paperwork.
{"title":"Secure Land Registration Management via Ethereum Blockchain","authors":"Shreyas Dubey, Divyansh Vinod, Akash Gupta, Rajendra Kumar Dwivedi","doi":"10.1109/IDCIoT56793.2023.10053494","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053494","url":null,"abstract":"Land is an asset and the transfer of ownership of a piece of land from one party to another is an important as well as tedious task. Not only it involves hectic paperwork but also several middlemen and multiple verifications at various levels of the process. This makes the whole process less reliable and increases the chances of forgery multifold. Also, it’s difficult to find out the previous transfers. This problem can be easily taken care of by using blockchain for the land registration system. This will decrease corruption in the process by removing middlemen from the process. Also, it will increase the speed, and create trust in the system without even the involvement of any central agency. Blockchain is a decentralized, immutable ledger that keeps track of every legitimate transaction. It uses cryptographic techniques, consensus mechanisms, and hashing algorithms to maintain the chain of transactions. This keeps the whole system transparent and immutable. The aim of this work is to develop a user-friendly, blockchain-based land registration system to ease the process while maintaining security and trust. In places like India where lacs of transfers are done on a regular basis, the quantity of paper used to maintain the records is also very high. Not only will this system bring common people closer to technology, but it will also help protect the environment by removing manual paperwork.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"36 1","pages":"185-191"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81367628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Blockchain has built-in security features. Basic concepts in blockchain include cryptographic, decentralized, and consensus concepts that guarantee integrity. It's been extremely difficult for a very long time to create a safe and secure electronic voting system that gives the clarity and versatility provided by electronic systems, as well as the transparency and privacy supplied by present voting systems. In this research work, blockchain application is assessed for implementing decentralized electronic voting systems. The study offers a different electronic voting system based on blockchain that tackles some of the drawbacks and limitations of current systems and assesses some of the well-known blockchain frameworks in order to build a blockchain-based e-voting system. Through the analysis of a case study, the possibilities of distributed ledger technology have been specifically evaluated.
{"title":"Designing a Blockchain-Enabled Methodology for Secure Online Voting System","authors":"Saurabh Singh, Alisha Singh, Shivam Verma, Rajendra Kumar Dwivedi","doi":"10.1109/IDCIoT56793.2023.10053410","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053410","url":null,"abstract":"Blockchain has built-in security features. Basic concepts in blockchain include cryptographic, decentralized, and consensus concepts that guarantee integrity. It's been extremely difficult for a very long time to create a safe and secure electronic voting system that gives the clarity and versatility provided by electronic systems, as well as the transparency and privacy supplied by present voting systems. In this research work, blockchain application is assessed for implementing decentralized electronic voting systems. The study offers a different electronic voting system based on blockchain that tackles some of the drawbacks and limitations of current systems and assesses some of the well-known blockchain frameworks in order to build a blockchain-based e-voting system. Through the analysis of a case study, the possibilities of distributed ledger technology have been specifically evaluated.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"41 1","pages":"178-184"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82485983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053544
S. M, Hussain. Sk, Yashitha Anju. B, V. S, P. R. Kumar, K. Sailaja
The issuance of fake degrees and certificates is one of the biggest concerns in society. This kind of employment through fake certificates will lead to a whole set of workforces who are not properly educated or trained. This can result in poor growth of the organization. The existing method of verifying the certificates involves sending an email of the certificate to the institute, the organization would respond with a reply mail containing all the details of the student along with the verification result. The drawbacks involved in this approach are delays in the verification process and this method becomes complex if the number of certificates to be verified is huge. Our approach to this problem involves detecting the labels in the image and extracting corresponding fields to be verified from the original image as multiple cropped images, the text in these cropped images is recognized using the EasyOCR module available in python. The institute database is searched for a match with the extracted details and the results after querying are sent back. This entire verification process is implemented as client-server architecture for easy access.
{"title":"Automatic Certificate Verification using Computer Vision","authors":"S. M, Hussain. Sk, Yashitha Anju. B, V. S, P. R. Kumar, K. Sailaja","doi":"10.1109/IDCIoT56793.2023.10053544","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053544","url":null,"abstract":"The issuance of fake degrees and certificates is one of the biggest concerns in society. This kind of employment through fake certificates will lead to a whole set of workforces who are not properly educated or trained. This can result in poor growth of the organization. The existing method of verifying the certificates involves sending an email of the certificate to the institute, the organization would respond with a reply mail containing all the details of the student along with the verification result. The drawbacks involved in this approach are delays in the verification process and this method becomes complex if the number of certificates to be verified is huge. Our approach to this problem involves detecting the labels in the image and extracting corresponding fields to be verified from the original image as multiple cropped images, the text in these cropped images is recognized using the EasyOCR module available in python. The institute database is searched for a match with the extracted details and the results after querying are sent back. This entire verification process is implemented as client-server architecture for easy access.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"4 1","pages":"332-335"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76094206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053450
Darshanaben D. Pandya, Abhijeetsinh Jadeja, S. Degadwala, Dhairya Vyas
The mood disease depression is quite severe. Those who suffer from depression are often unable to function normally and may even resort to suicide if their condition worsens. Clinical interviews and questionnaires are now used in all cases of depression diagnosis, although these procedures are very subjective and lack objectivity and physiological basis. By calculating Beck Depression Inventory II (BDI-II) values from video data, we present an objective and non-discriminatory technique for depression diagnosis in this study. First, we use the LBP-TOP and EVLBP algorithms to extract a dynamic feature from each frame of the movie separately. The LBP operator is applied to each frame, HOG features are extracted from the LBP picture, and finally the LBP-HOG features are transformed into histogram vectors using BOW. Finally, the Gradient Boosting Regression is used to the combined dynamic and static characteristics to calculate the BDI-II. Using the AVEC 2014 depression dataset as an example, our tests demonstrate the efficacy of our suggested method.
{"title":"Diagnostic Criteria for Depression based on Both Static and Dynamic Visual Features","authors":"Darshanaben D. Pandya, Abhijeetsinh Jadeja, S. Degadwala, Dhairya Vyas","doi":"10.1109/IDCIoT56793.2023.10053450","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053450","url":null,"abstract":"The mood disease depression is quite severe. Those who suffer from depression are often unable to function normally and may even resort to suicide if their condition worsens. Clinical interviews and questionnaires are now used in all cases of depression diagnosis, although these procedures are very subjective and lack objectivity and physiological basis. By calculating Beck Depression Inventory II (BDI-II) values from video data, we present an objective and non-discriminatory technique for depression diagnosis in this study. First, we use the LBP-TOP and EVLBP algorithms to extract a dynamic feature from each frame of the movie separately. The LBP operator is applied to each frame, HOG features are extracted from the LBP picture, and finally the LBP-HOG features are transformed into histogram vectors using BOW. Finally, the Gradient Boosting Regression is used to the combined dynamic and static characteristics to calculate the BDI-II. Using the AVEC 2014 depression dataset as an example, our tests demonstrate the efficacy of our suggested method.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"3 1","pages":"635-639"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76221295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053511
V. Priya, M. A. Sri, S. Sunithamani, S. Roy
In today's given condition a person must execute their daily activities by wearing a mask due to the pandemic. There are certain situations in which the person is forced to remove the mask while performing them. For example, consider the conventional method of the face recognition system for attendance monitoring where the individual is forced to remove the mask which is not appreciable in the current scenario. Hence there is a need to build a system that helps the individual to mark the attendance without the need of removing the mask. It would have been impossible to construct a system that could recognize individuals before the last two decades, but because of advances in the science of computer vision, it is now conceivable. The model uses a Caffe model for face detection and a CNN model for recognition along with the Haar Cascade classifier. The model was created to use real-time applications. The system is built with an accuracy of 90%.
{"title":"Development of a Face Recognition System for Registering Attendance of Students Wearing Mask","authors":"V. Priya, M. A. Sri, S. Sunithamani, S. Roy","doi":"10.1109/IDCIoT56793.2023.10053511","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053511","url":null,"abstract":"In today's given condition a person must execute their daily activities by wearing a mask due to the pandemic. There are certain situations in which the person is forced to remove the mask while performing them. For example, consider the conventional method of the face recognition system for attendance monitoring where the individual is forced to remove the mask which is not appreciable in the current scenario. Hence there is a need to build a system that helps the individual to mark the attendance without the need of removing the mask. It would have been impossible to construct a system that could recognize individuals before the last two decades, but because of advances in the science of computer vision, it is now conceivable. The model uses a Caffe model for face detection and a CNN model for recognition along with the Haar Cascade classifier. The model was created to use real-time applications. The system is built with an accuracy of 90%.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"14 1","pages":"239-244"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87172146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}