首页 > 最新文献

物联网技术最新文献

英文 中文
Building a Smart City: A Conceptual Approach to Real-Time Urban Flood Control System 建设智慧城市:城市实时防洪系统的概念途径
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053509
Anil Hingmire, P. Bhaladhare
Controlling urban flooding is a difficult issue for municipal planners. In order to handle the calamity, current research has focused on flood prediction, detection, monitoring, and warning systems. This research study proposes the water sensitive storm water network model. Based on water sensitive storm water network model, the real-time urban flood control method is proposed. The approach is based on real time flood data for water catchments that were gathered by using sensors and autonomous smart controller. The methodology of a smart flood resilient system prevents the surface flood water and is scalable to smart cities, which employ real-time parameters to automatically control urban floods. The proposed method optimizes the action of actuators in the sub catchment area in terms of early control of flood water.
控制城市洪水对市政规划者来说是一个难题。为了应对灾害,目前的研究重点是洪水预测、探测、监测和预警系统。本研究提出了水敏感性暴雨水网模型。基于水敏暴雨水网模型,提出了城市洪水实时控制方法。该方法基于集水区的实时洪水数据,这些数据是通过传感器和自主智能控制器收集的。智能洪水弹性系统的方法可以防止地表洪水泛滥,并可扩展到智能城市,智能城市采用实时参数自动控制城市洪水。该方法从洪水早期控制的角度出发,优化了子集水区执行器的作用。
{"title":"Building a Smart City: A Conceptual Approach to Real-Time Urban Flood Control System","authors":"Anil Hingmire, P. Bhaladhare","doi":"10.1109/IDCIoT56793.2023.10053509","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053509","url":null,"abstract":"Controlling urban flooding is a difficult issue for municipal planners. In order to handle the calamity, current research has focused on flood prediction, detection, monitoring, and warning systems. This research study proposes the water sensitive storm water network model. Based on water sensitive storm water network model, the real-time urban flood control method is proposed. The approach is based on real time flood data for water catchments that were gathered by using sensors and autonomous smart controller. The methodology of a smart flood resilient system prevents the surface flood water and is scalable to smart cities, which employ real-time parameters to automatically control urban floods. The proposed method optimizes the action of actuators in the sub catchment area in terms of early control of flood water.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73082593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Security System using Shuffling Keypad with SOS System 使用洗牌键盘和SOS系统的智能安全系统
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053455
Harsh Vardhan Bajaj, A. Nijanth, A. Linsie, M. Saravana Sanjhay
Security systems for lockers or vaults these days have been largely compromised. As technology advances, the possibility of robbery also increases. One of the most secure and widely used security systems is password protected. As with any devices that use a keypad for authentication or access, there is a risk that the password will be compromised by unscrupulous individual may deliberately observe your finger motions on the keyboard and attempt to predict your password or use the powder method to recognize fingerprints. This paper presents a smart security system with a shuffling keyboard to overcome the issues and reduce the thefts. This system also comprises solutions for robberies in case of hostage situations, attack on the large organizations, home thefts, and unauthorized vehicle access by activating smooth silent alert system. This system is built by using Micro controller with touch screen. The screen displays every message for the users understanding.
如今,储物柜或保险库的安全系统在很大程度上遭到了破坏。随着科技的进步,抢劫的可能性也在增加。密码保护是最安全、应用最广泛的安全系统之一。与任何使用键盘进行身份验证或访问的设备一样,存在密码被不法分子泄露的风险,这些不法分子可能会故意观察你手指在键盘上的动作,并试图预测你的密码或使用粉末方法识别指纹。为了克服这一问题,减少盗窃,本文提出了一种带洗牌键盘的智能防盗系统。该系统还通过启动平滑的无声警报系统,为人质劫持、大型机构袭击、家庭盗窃和未经授权的车辆进入等情况提供了解决方案。本系统采用触摸屏单片机构成。屏幕显示每条消息,以便用户理解。
{"title":"Smart Security System using Shuffling Keypad with SOS System","authors":"Harsh Vardhan Bajaj, A. Nijanth, A. Linsie, M. Saravana Sanjhay","doi":"10.1109/IDCIoT56793.2023.10053455","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053455","url":null,"abstract":"Security systems for lockers or vaults these days have been largely compromised. As technology advances, the possibility of robbery also increases. One of the most secure and widely used security systems is password protected. As with any devices that use a keypad for authentication or access, there is a risk that the password will be compromised by unscrupulous individual may deliberately observe your finger motions on the keyboard and attempt to predict your password or use the powder method to recognize fingerprints. This paper presents a smart security system with a shuffling keyboard to overcome the issues and reduce the thefts. This system also comprises solutions for robberies in case of hostage situations, attack on the large organizations, home thefts, and unauthorized vehicle access by activating smooth silent alert system. This system is built by using Micro controller with touch screen. The screen displays every message for the users understanding.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81940687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intrusion Detection System for MANET to Detect Gray Hole Attack using Fuzzy Logic System 基于模糊逻辑系统的无线局域网入侵检测系统
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053550
K. Bala, J. Paramesh, K. Elma, S. Santhanalakshmi
The Mobile Ad hoc network (MANET) is a kind of wireless communication network that is composed of several nodes which are highly movable throughout the various directions in the network. Due to nonexistence of infrastructure in the MANET, the nodes can interconnect with one another in a random fashion. The Intrusion Detection System (IDS) is an observing parameter which is used to identify the suspicious functioning in the network and intimates through alert to the security operation center. Based upon the constraints, the center examines the problem and solves the constraints using necessary steps and solution. The transformation of the gray hole attack. The important consequences in the wireless sensor network involves the grey hole attack. It is a revolution of the black hole attack. This leads to decrease the efficiency of the network. Thus, to overcome the various malicious attacks, the proposed system is implemented with fuzzy logic system to enhance the efficiency in the networking system.
移动自组网(MANET)是一种由多个节点组成的无线通信网络,这些节点在网络的各个方向上都是高度可移动的。由于在MANET中不存在基础设施,节点之间可以以随机方式相互连接。入侵检测系统(IDS)是一种观察参数,用于识别网络中的可疑功能,并通过警报通知安全运营中心。根据约束条件,中心检查问题,并使用必要的步骤和解决方案解决约束条件。灰洞攻击的变换。灰洞攻击是无线传感器网络中的一个重要问题。这是一场黑洞攻击的革命。这导致了网络效率的降低。因此,为了克服各种恶意攻击,本文提出的系统采用模糊逻辑系统来实现,以提高网络系统的效率。
{"title":"An Intrusion Detection System for MANET to Detect Gray Hole Attack using Fuzzy Logic System","authors":"K. Bala, J. Paramesh, K. Elma, S. Santhanalakshmi","doi":"10.1109/IDCIoT56793.2023.10053550","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053550","url":null,"abstract":"The Mobile Ad hoc network (MANET) is a kind of wireless communication network that is composed of several nodes which are highly movable throughout the various directions in the network. Due to nonexistence of infrastructure in the MANET, the nodes can interconnect with one another in a random fashion. The Intrusion Detection System (IDS) is an observing parameter which is used to identify the suspicious functioning in the network and intimates through alert to the security operation center. Based upon the constraints, the center examines the problem and solves the constraints using necessary steps and solution. The transformation of the gray hole attack. The important consequences in the wireless sensor network involves the grey hole attack. It is a revolution of the black hole attack. This leads to decrease the efficiency of the network. Thus, to overcome the various malicious attacks, the proposed system is implemented with fuzzy logic system to enhance the efficiency in the networking system.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81014835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis on Different Optimization Methods, Applications, and Categories of Optical Fiber Networks: A Review 光纤网络的不同优化方法、应用和类别分析
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053521
Arjun Dubey, Harmeet Singh, Simarpreet Kaur
OFs (Optical Fibers) are broadly used for information broadcast systems due to their extensive information-carrying capability and dielectric environment. The OFs network architectures that use several WLs (wavelengths) per OFs connect thousands of users in central, urban, or large-scale applications with a wide range of transmission speeds and capabilities. This article defines a detailed introduction to optical fiber networks and general phases of communication of OF (Optical Fiber) procedure. The taxonomy may be based on optical fibers such as; (i) Structure, (ii) number of modes, (iii) refractive index profile, (iv) dispersion, (v) signal processing capacity (vi) Polarization. After that, it explains the merits and demerits of optical fiber networks. They studied optical wireless communications applications such as SMs (shopping malls), UW (underwater), industries, etc. Several analyses with different optimization methods such as Genetic Algorithm (GA), Ant Colony Optimization (ACO), and Particle-Swarm Optimization (PSO) algorithms. An effective resource-allocation method is required to reduce the issue of EE (energy-efficiency) and improve the presentation of quality-of-services of the ONs (Optical Networks).
光纤由于具有广泛的信息承载能力和介质环境,在信息广播系统中得到了广泛的应用。每个OFs使用几个波长(波长)的OFs网络架构以广泛的传输速度和能力连接中心、城市或大规模应用中的数千个用户。本文详细介绍了光纤网络和光纤通信的一般阶段。分类可以基于光纤,如;(i)结构,(ii)模式数,(iii)折射率分布,(iv)色散,(v)信号处理能力(vi)偏振。然后,阐述了光纤网络的优缺点。他们研究了SMs(商场)、UW(水下)、工业等光通信应用。对遗传算法(GA)、蚁群算法(ACO)和粒子群算法(PSO)等不同优化方法进行了分析。需要一种有效的资源分配方法来减少能源效率问题和改善光网络的服务质量。
{"title":"Analysis on Different Optimization Methods, Applications, and Categories of Optical Fiber Networks: A Review","authors":"Arjun Dubey, Harmeet Singh, Simarpreet Kaur","doi":"10.1109/IDCIoT56793.2023.10053521","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053521","url":null,"abstract":"OFs (Optical Fibers) are broadly used for information broadcast systems due to their extensive information-carrying capability and dielectric environment. The OFs network architectures that use several WLs (wavelengths) per OFs connect thousands of users in central, urban, or large-scale applications with a wide range of transmission speeds and capabilities. This article defines a detailed introduction to optical fiber networks and general phases of communication of OF (Optical Fiber) procedure. The taxonomy may be based on optical fibers such as; (i) Structure, (ii) number of modes, (iii) refractive index profile, (iv) dispersion, (v) signal processing capacity (vi) Polarization. After that, it explains the merits and demerits of optical fiber networks. They studied optical wireless communications applications such as SMs (shopping malls), UW (underwater), industries, etc. Several analyses with different optimization methods such as Genetic Algorithm (GA), Ant Colony Optimization (ACO), and Particle-Swarm Optimization (PSO) algorithms. An effective resource-allocation method is required to reduce the issue of EE (energy-efficiency) and improve the presentation of quality-of-services of the ONs (Optical Networks).","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79971145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
File Encryption-Decryption using Java 文件加密-解密使用Java
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053514
Saleha Saudagar, Neha Kamtalwar, Harsh Karadbhajne, Mandar D. Karmarkar, H. Kendre, Ojas Ketkar
Data has been the most valued asset of any industry throughout the course of time. And with the advent of the Internet and virtual platforms, data exchange via text files or media files has been accelerated multiple folds. However, the increase in the amount of data exchange also makes private data more vulnerable to external attacks. Multiple methods have been implemented to ensure safe and reliable pathways of exchanging data like securing the network-line via a VPN or using enhanced communication protocols like FTP(File Transfer Protocol) or SMTP(Secured Mail Transfer Protocol). Even though there have been mulitple methods to secure data transfer ways, the actual data still remains vulnerable and ready to use should these systems get overridden. Instead, a better method might be to actually encrypt the data and ensure that the main data stays independently secure apart from the secure pathways created. To address this specific issue, this paper proposes a system developed purely using java algorithms that can encrypt media files and decrypt them to protect the data they contain. Three different types of algorithms are applied to protect various types of files like mp4, png, jpg, pdf, doc, xml, etc.
随着时间的推移,数据一直是任何行业最有价值的资产。随着互联网和虚拟平台的出现,通过文本文件或媒体文件进行数据交换的速度加快了数倍。然而,数据交换量的增加也使得私有数据更容易受到外部攻击。已经实现了多种方法来确保交换数据的安全可靠途径,例如通过VPN保护网络线路或使用增强的通信协议,如FTP(文件传输协议)或SMTP(安全邮件传输协议)。尽管已经有多种方法来保护数据传输方式,但实际数据仍然容易受到攻击,一旦这些系统被覆盖,就可以随时使用。相反,更好的方法可能是对数据进行加密,并确保主数据与所创建的安全路径保持独立安全。为了解决这一具体问题,本文提出了一个纯粹使用java算法开发的系统,该系统可以对媒体文件进行加密和解密,以保护其中包含的数据。三种不同类型的算法应用于保护各种类型的文件,如mp4, png, jpg, pdf, doc, xml等。
{"title":"File Encryption-Decryption using Java","authors":"Saleha Saudagar, Neha Kamtalwar, Harsh Karadbhajne, Mandar D. Karmarkar, H. Kendre, Ojas Ketkar","doi":"10.1109/IDCIoT56793.2023.10053514","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053514","url":null,"abstract":"Data has been the most valued asset of any industry throughout the course of time. And with the advent of the Internet and virtual platforms, data exchange via text files or media files has been accelerated multiple folds. However, the increase in the amount of data exchange also makes private data more vulnerable to external attacks. Multiple methods have been implemented to ensure safe and reliable pathways of exchanging data like securing the network-line via a VPN or using enhanced communication protocols like FTP(File Transfer Protocol) or SMTP(Secured Mail Transfer Protocol). Even though there have been mulitple methods to secure data transfer ways, the actual data still remains vulnerable and ready to use should these systems get overridden. Instead, a better method might be to actually encrypt the data and ensure that the main data stays independently secure apart from the secure pathways created. To address this specific issue, this paper proposes a system developed purely using java algorithms that can encrypt media files and decrypt them to protect the data they contain. Three different types of algorithms are applied to protect various types of files like mp4, png, jpg, pdf, doc, xml, etc.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80353519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Land Registration Management via Ethereum Blockchain 基于以太坊区块链的安全土地注册管理
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053494
Shreyas Dubey, Divyansh Vinod, Akash Gupta, Rajendra Kumar Dwivedi
Land is an asset and the transfer of ownership of a piece of land from one party to another is an important as well as tedious task. Not only it involves hectic paperwork but also several middlemen and multiple verifications at various levels of the process. This makes the whole process less reliable and increases the chances of forgery multifold. Also, it’s difficult to find out the previous transfers. This problem can be easily taken care of by using blockchain for the land registration system. This will decrease corruption in the process by removing middlemen from the process. Also, it will increase the speed, and create trust in the system without even the involvement of any central agency. Blockchain is a decentralized, immutable ledger that keeps track of every legitimate transaction. It uses cryptographic techniques, consensus mechanisms, and hashing algorithms to maintain the chain of transactions. This keeps the whole system transparent and immutable. The aim of this work is to develop a user-friendly, blockchain-based land registration system to ease the process while maintaining security and trust. In places like India where lacs of transfers are done on a regular basis, the quantity of paper used to maintain the records is also very high. Not only will this system bring common people closer to technology, but it will also help protect the environment by removing manual paperwork.
土地是一种资产,将一块土地的所有权从一方转让给另一方是一项重要而繁琐的任务。它不仅涉及繁忙的文书工作,而且涉及几个中间人和在过程的各个层面进行多次核实。这使得整个过程不那么可靠,并增加了伪造的机会。而且,以前的转账也很难查到。这个问题可以通过在土地登记系统中使用区块链来轻松解决。这将通过消除中间商来减少过程中的腐败。此外,它将提高速度,并在没有任何中央机构参与的情况下建立对系统的信任。区块链是一种分散的、不可变的分类账,可以跟踪每一笔合法交易。它使用加密技术、共识机制和哈希算法来维护交易链。这使整个系统保持透明和不可变。这项工作的目的是开发一个用户友好的、基于区块链的土地注册系统,以简化流程,同时保持安全性和信任。在像印度这样的地方,缺乏定期转账,用于保存记录的纸张数量也非常高。这个系统不仅会让普通人更接近科技,而且还会通过消除手工文书工作来帮助保护环境。
{"title":"Secure Land Registration Management via Ethereum Blockchain","authors":"Shreyas Dubey, Divyansh Vinod, Akash Gupta, Rajendra Kumar Dwivedi","doi":"10.1109/IDCIoT56793.2023.10053494","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053494","url":null,"abstract":"Land is an asset and the transfer of ownership of a piece of land from one party to another is an important as well as tedious task. Not only it involves hectic paperwork but also several middlemen and multiple verifications at various levels of the process. This makes the whole process less reliable and increases the chances of forgery multifold. Also, it’s difficult to find out the previous transfers. This problem can be easily taken care of by using blockchain for the land registration system. This will decrease corruption in the process by removing middlemen from the process. Also, it will increase the speed, and create trust in the system without even the involvement of any central agency. Blockchain is a decentralized, immutable ledger that keeps track of every legitimate transaction. It uses cryptographic techniques, consensus mechanisms, and hashing algorithms to maintain the chain of transactions. This keeps the whole system transparent and immutable. The aim of this work is to develop a user-friendly, blockchain-based land registration system to ease the process while maintaining security and trust. In places like India where lacs of transfers are done on a regular basis, the quantity of paper used to maintain the records is also very high. Not only will this system bring common people closer to technology, but it will also help protect the environment by removing manual paperwork.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81367628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing a Blockchain-Enabled Methodology for Secure Online Voting System 设计一种支持区块链的安全在线投票系统方法
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053410
Saurabh Singh, Alisha Singh, Shivam Verma, Rajendra Kumar Dwivedi
Blockchain has built-in security features. Basic concepts in blockchain include cryptographic, decentralized, and consensus concepts that guarantee integrity. It's been extremely difficult for a very long time to create a safe and secure electronic voting system that gives the clarity and versatility provided by electronic systems, as well as the transparency and privacy supplied by present voting systems. In this research work, blockchain application is assessed for implementing decentralized electronic voting systems. The study offers a different electronic voting system based on blockchain that tackles some of the drawbacks and limitations of current systems and assesses some of the well-known blockchain frameworks in order to build a blockchain-based e-voting system. Through the analysis of a case study, the possibilities of distributed ledger technology have been specifically evaluated.
区块链具有内置的安全功能。区块链的基本概念包括保证完整性的加密、去中心化和共识概念。很长一段时间以来,创建一个安全可靠的电子投票系统是非常困难的,它既能提供电子系统提供的清晰度和多功能性,又能提供现有投票系统提供的透明度和隐私性。在这项研究工作中,评估了区块链应用于实现分散的电子投票系统。该研究提供了一种基于区块链的不同电子投票系统,解决了当前系统的一些缺点和局限性,并评估了一些知名的区块链框架,以构建基于区块链的电子投票系统。通过案例分析,对分布式账本技术的可能性进行了具体评估。
{"title":"Designing a Blockchain-Enabled Methodology for Secure Online Voting System","authors":"Saurabh Singh, Alisha Singh, Shivam Verma, Rajendra Kumar Dwivedi","doi":"10.1109/IDCIoT56793.2023.10053410","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053410","url":null,"abstract":"Blockchain has built-in security features. Basic concepts in blockchain include cryptographic, decentralized, and consensus concepts that guarantee integrity. It's been extremely difficult for a very long time to create a safe and secure electronic voting system that gives the clarity and versatility provided by electronic systems, as well as the transparency and privacy supplied by present voting systems. In this research work, blockchain application is assessed for implementing decentralized electronic voting systems. The study offers a different electronic voting system based on blockchain that tackles some of the drawbacks and limitations of current systems and assesses some of the well-known blockchain frameworks in order to build a blockchain-based e-voting system. Through the analysis of a case study, the possibilities of distributed ledger technology have been specifically evaluated.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82485983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Certificate Verification using Computer Vision 使用计算机视觉自动证书验证
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053544
S. M, Hussain. Sk, Yashitha Anju. B, V. S, P. R. Kumar, K. Sailaja
The issuance of fake degrees and certificates is one of the biggest concerns in society. This kind of employment through fake certificates will lead to a whole set of workforces who are not properly educated or trained. This can result in poor growth of the organization. The existing method of verifying the certificates involves sending an email of the certificate to the institute, the organization would respond with a reply mail containing all the details of the student along with the verification result. The drawbacks involved in this approach are delays in the verification process and this method becomes complex if the number of certificates to be verified is huge. Our approach to this problem involves detecting the labels in the image and extracting corresponding fields to be verified from the original image as multiple cropped images, the text in these cropped images is recognized using the EasyOCR module available in python. The institute database is searched for a match with the extracted details and the results after querying are sent back. This entire verification process is implemented as client-server architecture for easy access.
假学位和假证书的发放是社会最大的问题之一。这种通过假证书的就业将导致一大批没有受过适当教育或培训的劳动力。这可能导致组织的不良增长。现有的证书验证方法包括将证书的电子邮件发送给学院,组织将回复包含学生所有详细信息以及验证结果的回复邮件。这种方法的缺点是验证过程的延迟,如果要验证的证书数量很大,这种方法就会变得复杂。我们解决这个问题的方法包括检测图像中的标签,并从原始图像中提取相应的字段作为多个裁剪图像进行验证,这些裁剪图像中的文本使用python中可用的EasyOCR模块进行识别。在研究所数据库中搜索与提取的详细信息匹配的信息,并将查询后的结果发回。为了便于访问,整个验证过程是作为客户机-服务器架构实现的。
{"title":"Automatic Certificate Verification using Computer Vision","authors":"S. M, Hussain. Sk, Yashitha Anju. B, V. S, P. R. Kumar, K. Sailaja","doi":"10.1109/IDCIoT56793.2023.10053544","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053544","url":null,"abstract":"The issuance of fake degrees and certificates is one of the biggest concerns in society. This kind of employment through fake certificates will lead to a whole set of workforces who are not properly educated or trained. This can result in poor growth of the organization. The existing method of verifying the certificates involves sending an email of the certificate to the institute, the organization would respond with a reply mail containing all the details of the student along with the verification result. The drawbacks involved in this approach are delays in the verification process and this method becomes complex if the number of certificates to be verified is huge. Our approach to this problem involves detecting the labels in the image and extracting corresponding fields to be verified from the original image as multiple cropped images, the text in these cropped images is recognized using the EasyOCR module available in python. The institute database is searched for a match with the extracted details and the results after querying are sent back. This entire verification process is implemented as client-server architecture for easy access.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76094206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diagnostic Criteria for Depression based on Both Static and Dynamic Visual Features 基于静态和动态视觉特征的抑郁症诊断标准
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053450
Darshanaben D. Pandya, Abhijeetsinh Jadeja, S. Degadwala, Dhairya Vyas
The mood disease depression is quite severe. Those who suffer from depression are often unable to function normally and may even resort to suicide if their condition worsens. Clinical interviews and questionnaires are now used in all cases of depression diagnosis, although these procedures are very subjective and lack objectivity and physiological basis. By calculating Beck Depression Inventory II (BDI-II) values from video data, we present an objective and non-discriminatory technique for depression diagnosis in this study. First, we use the LBP-TOP and EVLBP algorithms to extract a dynamic feature from each frame of the movie separately. The LBP operator is applied to each frame, HOG features are extracted from the LBP picture, and finally the LBP-HOG features are transformed into histogram vectors using BOW. Finally, the Gradient Boosting Regression is used to the combined dynamic and static characteristics to calculate the BDI-II. Using the AVEC 2014 depression dataset as an example, our tests demonstrate the efficacy of our suggested method.
抑郁症是一种非常严重的情绪疾病。那些患有抑郁症的人通常无法正常运作,如果病情恶化,甚至可能诉诸自杀。临床访谈和问卷调查现在用于所有抑郁症的诊断,尽管这些程序是非常主观的,缺乏客观性和生理基础。通过从视频数据中计算贝克抑郁量表II (BDI-II)值,我们提出了一种客观和非歧视性的抑郁症诊断技术。首先,我们使用LBP-TOP和EVLBP算法分别从电影的每一帧中提取动态特征。将LBP算子应用于每一帧,从LBP图像中提取HOG特征,最后使用BOW将LBP-HOG特征转换为直方图向量。最后,将梯度增强回归方法应用于动态和静态特征相结合的BDI-II计算。以AVEC 2014抑郁数据为例,验证了该方法的有效性。
{"title":"Diagnostic Criteria for Depression based on Both Static and Dynamic Visual Features","authors":"Darshanaben D. Pandya, Abhijeetsinh Jadeja, S. Degadwala, Dhairya Vyas","doi":"10.1109/IDCIoT56793.2023.10053450","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053450","url":null,"abstract":"The mood disease depression is quite severe. Those who suffer from depression are often unable to function normally and may even resort to suicide if their condition worsens. Clinical interviews and questionnaires are now used in all cases of depression diagnosis, although these procedures are very subjective and lack objectivity and physiological basis. By calculating Beck Depression Inventory II (BDI-II) values from video data, we present an objective and non-discriminatory technique for depression diagnosis in this study. First, we use the LBP-TOP and EVLBP algorithms to extract a dynamic feature from each frame of the movie separately. The LBP operator is applied to each frame, HOG features are extracted from the LBP picture, and finally the LBP-HOG features are transformed into histogram vectors using BOW. Finally, the Gradient Boosting Regression is used to the combined dynamic and static characteristics to calculate the BDI-II. Using the AVEC 2014 depression dataset as an example, our tests demonstrate the efficacy of our suggested method.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76221295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of a Face Recognition System for Registering Attendance of Students Wearing Mask 戴口罩学生考勤人脸识别系统的开发
Pub Date : 2023-01-05 DOI: 10.1109/IDCIoT56793.2023.10053511
V. Priya, M. A. Sri, S. Sunithamani, S. Roy
In today's given condition a person must execute their daily activities by wearing a mask due to the pandemic. There are certain situations in which the person is forced to remove the mask while performing them. For example, consider the conventional method of the face recognition system for attendance monitoring where the individual is forced to remove the mask which is not appreciable in the current scenario. Hence there is a need to build a system that helps the individual to mark the attendance without the need of removing the mask. It would have been impossible to construct a system that could recognize individuals before the last two decades, but because of advances in the science of computer vision, it is now conceivable. The model uses a Caffe model for face detection and a CNN model for recognition along with the Haar Cascade classifier. The model was created to use real-time applications. The system is built with an accuracy of 90%.
在目前的情况下,由于流感大流行,人们必须戴着口罩进行日常活动。在某些情况下,人们在表演时被迫摘下面具。例如,考虑用于考勤监控的面部识别系统的传统方法,其中个人被迫摘下口罩,这在当前情况下是不可取的。因此,有必要建立一个系统,帮助个人标记出勤,而不需要摘下口罩。在过去的二十年里,构建一个能够识别个人的系统是不可能的,但由于计算机视觉科学的进步,现在已经可以想象了。该模型使用Caffe模型进行人脸检测,使用CNN模型进行识别,并使用Haar级联分类器。该模型的创建是为了使用实时应用程序。该系统的构建精度为90%。
{"title":"Development of a Face Recognition System for Registering Attendance of Students Wearing Mask","authors":"V. Priya, M. A. Sri, S. Sunithamani, S. Roy","doi":"10.1109/IDCIoT56793.2023.10053511","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053511","url":null,"abstract":"In today's given condition a person must execute their daily activities by wearing a mask due to the pandemic. There are certain situations in which the person is forced to remove the mask while performing them. For example, consider the conventional method of the face recognition system for attendance monitoring where the individual is forced to remove the mask which is not appreciable in the current scenario. Hence there is a need to build a system that helps the individual to mark the attendance without the need of removing the mask. It would have been impossible to construct a system that could recognize individuals before the last two decades, but because of advances in the science of computer vision, it is now conceivable. The model uses a Caffe model for face detection and a CNN model for recognition along with the Haar Cascade classifier. The model was created to use real-time applications. The system is built with an accuracy of 90%.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87172146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
物联网技术
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1