2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)最新文献

筛选
英文 中文
Conference Glimses 会议Glimses
{"title":"Conference Glimses","authors":"","doi":"10.1109/icetet-sip-2254415.2022.9791695","DOIUrl":"https://doi.org/10.1109/icetet-sip-2254415.2022.9791695","url":null,"abstract":"","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125272751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IOT based Home Automation with Fault Monitoring 基于物联网的家庭自动化与故障监控
Gauri Ghadge, P. Korde
{"title":"IOT based Home Automation with Fault Monitoring","authors":"Gauri Ghadge, P. Korde","doi":"10.1109/ICETET-SIP-2254415.2022.9791644","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791644","url":null,"abstract":"Energy consumption and power-saving have become most prominent now a day. In-home appliances, continuous use of load power in more amounts, and due to heating of the load (switching, vibrations, temperature changes, etc.), the load failure rate increases. In this approach, recent technologies came into interest, such as GSM/IOT use for the loads switching via mobile application or internet to turn the load off when they are not in use, also providing the mechanism to monitor various parameters like temperature, Vibrations of the load to predict early failure of the load also providing the mechanism to turn off the load. These devices become significant expenditures because the user is unwilling to risk external damage that disrupts the system's proper operation. This work developed the Simulink model that contains a single-phase AC voltage regulator for controlling the speed of load (fan). Different sensors values compare with reference values in MATLAB programming to monitor the fault and cut the load. In hardware model of the system contains an Atmega328 microcontroller, sensors such as temperature, vibration, current sensors, etc., Triac, load, NodeMCU, crystal display, GSM sim, etc. All are connected wire /wirelessly to control the speed, and also IoT paradigm is applied to the devices through node MCU to cut the load. Monitor the specific parameter and receive the SMS through GSM sim on mobile if a fault occurs. The suggested sensor and monitoring software solution allows the system to be integrated into the Cloud. These details will be necessary for product support and maintenance and customer assistance. Controlling of home power devices using programming by using a mobile app, i.e., on /off the device when not required form outstation also diagnosis the devices to detect initial failure so avoid more damage to appliances.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122513100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive Study on Machine Learning Algorithms for Intrusion Detection System 入侵检测系统机器学习算法的综合研究
Swati Mirlekar, K. Kanojia
{"title":"A Comprehensive Study on Machine Learning Algorithms for Intrusion Detection System","authors":"Swati Mirlekar, K. Kanojia","doi":"10.1109/ICETET-SIP-2254415.2022.9791586","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791586","url":null,"abstract":"Rapid advancements in areas of communication and the internet ensued a significant boost in data and capacity of the network. As a consequence, a plethora of novel threats are being built, creating it harder for network security to efficiently identify breaches. Furthermore, intruders also initiate multiple attacks inside this network must be taken into account. An intrusion Detection System (IDS) is a method that checks network activity for availability, consistency, and secrecy to defend the network from potential invasions. Although the greatest efforts of professionals, IDSs continue to struggle with enhancing detecting accurateness whilst lowering false alarm rates and detecting newer intrusions. IDS systems based on ML (Machine Learning), as well as DL (Deep Learning), have recently been deployed as feasible procedures for swiftly identifying network intrusions. The taxonomy presented in this article is based on well-known ML as well as DL approaches for building network-based IDS (NIDS) systems, as well as it first defines the concept of IDS. In this comprehensive review of existing NIDS-based research, the merits and limitations of the suggested solutions are thoroughly explored. This evaluation may act as a standard for researchers and industry in terms of the advancement and development of Network Intrusion Detection Systems in the future.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126526435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Different Encryption Techniques used in Watermarking Algorithm for the Security of Medical Image 医学图像安全水印算法中不同加密技术的分析
Namita D. Pulgam, S. Shinde
{"title":"Analysis of Different Encryption Techniques used in Watermarking Algorithm for the Security of Medical Image","authors":"Namita D. Pulgam, S. Shinde","doi":"10.1109/ICETET-SIP-2254415.2022.9791814","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791814","url":null,"abstract":"Today, in the computerized age, the development and use of internet technology in healthcare has been increasing rapidly. Quick improvement is going on in the telemedicine field with a clear goal to design integrated applications in diagnostics and treatment. Hence medical images are preserved in databases for some time so that post diagnosis treatment will become easier for the patient and for doctors as well. During the process of the treatment patients tend to take experts' advice and that time images of the reports will be shared from one hospital to another. With the use of sharing and transmission technique post treatment cost gets reduced whereas increases the issue concerning the security of patients medical reports. It is important to keep track of images shared between two medical centers to identify sources of image generation as well as protecting patient's sensitive information from intruders or hackers against unauthorized access and modification. Digital watermarking can be used to provide ownership and copyright protection. In the watermarking system image or text can be inserted in the cover image to get a watermarked image. The watermark image or secret image to be inserted can be protected with encryption technique. Hence this paper presents a digital watermarking system designed with encryption techniques to provide security to patients' medical records. The system is evaluated by implementing it with various encryption techniques like Advanced Encryption Standard (AES) with 256 bits, AES-GCM, Triple Data Encryption Standard (TDES), Blowfish etc. The performance of the system is measured with PSNR and SSIM and assessment of the evaluation parameters shows that AES encryption is better in comparison with TDES and Blowfish.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127486159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Black Hole Detection and Prevention Using Digital Signature and SEP in MANET 基于数字签名和SEP的黑洞探测与预防
Sunil R. Gupta, Mohammad Shahid, Ankur Goyal, R. Saxena, Kamal Saluja
{"title":"Black Hole Detection and Prevention Using Digital Signature and SEP in MANET","authors":"Sunil R. Gupta, Mohammad Shahid, Ankur Goyal, R. Saxena, Kamal Saluja","doi":"10.1109/ICETET-SIP-2254415.2022.9791738","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791738","url":null,"abstract":"The MANET architecture's future growth will make extensive use of encryption and encryption to keep network participants safe. Using a digital signature node id, we illustrate how we may stimulate the safe growth of subjective clusters while simultaneously addressing security and energy efficiency concerns. The dynamic topology of MANET allows nodes to join and exit at any time. A form of attack known as a black hole assault was used to accomplish this. To demonstrate that he had the shortest path with the least amount of energy consumption, an attacker in MATLAB R2012a used a digital signature ID to authenticate the node from which he wished to intercept messages (DSEP). “Digital Signature”, “MANET,” and “AODV” are all terms used to describe various types of digital signatures. Black Hole Attack, Single Black Hole Attack, Digital Signature, and DSEP are just a few of the many terms associated with MANET.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130365884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Research and Analysis on Voice Based System with Machine Learning 基于语音的机器学习系统研究与分析
Gopal Vishwas Patil, V. Dhamdhere
{"title":"Research and Analysis on Voice Based System with Machine Learning","authors":"Gopal Vishwas Patil, V. Dhamdhere","doi":"10.1109/ICETET-SIP-2254415.2022.9791498","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791498","url":null,"abstract":"This Chatbots in banking are primarily used to improve the client experience. They do, however, benefit the personnel and help to avoid uncomfortable circumstances that can emerge from direct contact with clients. Customers might benefit from artificial intelligence in a variety of ways. The most prevalent use scenario for chatbots in bank customer service is the automation of mundane repetitive chores. These activities want quick and easy answers that necessitate self-learning. Banking chatbots can be implemented as standalone mobile banking applications or integrated banks' websites. Chatbots can be custom-made or ready-made in terms of their origin. Custom AI assistants are generally more effective and secure because they are built to exact requirements and under the close supervision of the financial institution where the hot will be incorporated. Ready-made solutions are generic bots designed to be as versatile as possible while yet allowing for some customization.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131211694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review Paper on Data Sensing and Acquisition Complexity and Accuracy in Green House Monitoring Systems 温室监测系统中数据感知与采集的复杂性与准确性研究综述
Pratik Malewar, R. Kadu, Rasika Kakde, Nikhil P. Wyawahare, Rahul Agrawal
{"title":"A Review Paper on Data Sensing and Acquisition Complexity and Accuracy in Green House Monitoring Systems","authors":"Pratik Malewar, R. Kadu, Rasika Kakde, Nikhil P. Wyawahare, Rahul Agrawal","doi":"10.1109/ICETET-SIP-2254415.2022.9791732","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791732","url":null,"abstract":"The research paper is based on data acquisition of greenhouse monitoring systems and the issues to reduce its data latency and complexity. The paper contains the various parameters on which the data latency is dependent. Many of us faced similar issues in the transmission of data of greenhouse systems because of data congestion. Data Congestion reduces the data transmission speed which increases the delay. But with a proper understanding of delay parameters, Data latency effect, and Communication protocols the Data Congestion can be minimized and the system accuracy can be increased.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115416472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Compact Wideband Antenna with DGS for IoT Applications using LoRa Technology 采用LoRa技术的物联网应用的DGS紧凑型宽带天线
Rashmi Roges, P. Malik, Sandeep Sharma
{"title":"A Compact Wideband Antenna with DGS for IoT Applications using LoRa Technology","authors":"Rashmi Roges, P. Malik, Sandeep Sharma","doi":"10.1109/ICETET-SIP-2254415.2022.9791725","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791725","url":null,"abstract":"A highly miniaturized antenna for IoT applications using LoRa technology is discussed in this paper. The antenna is double leaf shaped with DGS and is printed on FR4 substrate of size $22times 34times 0.5text{mm}^{3}$. The antenna has been designed and optimized to resonate at 433MHz and to include the LoRa frequency bands of 868MHz and 915MHz also. The simulated and experimental results of the antenna is in good agreement with a low VSWR in the operating range along with a radiation efficiency of 97% and a maximum gain of 2. 56dB. The size and performance of the proposed antenna are the main stand outs when compared with the similar antennas working in the same operating frequencies.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115713659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Employee Alerting System Using Real Time Drowsiness Detection 使用实时睡意检测的员工警报系统
Abhishek Gadde, Abhinandan Gorde, Aditya Bopte, Nidhi Kapgate, Aashay Nevatia, Swapnali Choudhari
{"title":"Employee Alerting System Using Real Time Drowsiness Detection","authors":"Abhishek Gadde, Abhinandan Gorde, Aditya Bopte, Nidhi Kapgate, Aashay Nevatia, Swapnali Choudhari","doi":"10.1109/ICETET-SIP-2254415.2022.9791811","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791811","url":null,"abstract":"The paper proposes a system which is developed for detecting drowsiness of an individual in real time. This system aims for the betterment of the society by increasing the productivity of the employee using Artificial Intelligence. This system will use a basic webcam programmed with a code, directly facing the individual to monitor the eyes and mouth of the user to derive whether the individual is drowsy or not. If symptoms of drowsiness such as yawning and closed eyes are detected, then the system buzzes alarm to alert the Employee. It utilizes the concept of Image Processing to detect the target area of the face. Python programming along and Open CV is interfaced for determining if the Eyes are closed and the person is yawning. The main objective of this project is to monitor any Employee who is working online to increase the productivity caused due to drowsiness and work fatigue. First, the edge of the face is detected, after finding the face, eyes and mouth are found using Facial Landmark Detector file in Dlib Library. After locating the eyes and mouth the distance between them is measured to determine whether they are Open or closed. If the Eyes are found closed for a specific time and mouth is found open for a specific time, then it is recorded. If the same continues for more than four times, then the employee gets an alerting buzz.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121387560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Health Monitoring System Using IoT 使用物联网的健康监测系统
Shruthi G R, S. Hombal, Sanchitha Bs, S. L, Sharanya G
{"title":"Health Monitoring System Using IoT","authors":"Shruthi G R, S. Hombal, Sanchitha Bs, S. L, Sharanya G","doi":"10.1109/ICETET-SIP-2254415.2022.9791649","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791649","url":null,"abstract":"A clinical benefit is basic for everyone all over the place. Since the time the pandemic started, managing prosperity is given the most need. The clinical consideration environment has cultivated a data-based distant sensor which helps in detaching most of the issues all over. Patients are standing up to an unsafe situation of startling destruction in light of the specific clarification of heart issues and assault which is an aftereffect of the nonexistence of good clinical help to patients at the necessary time. So the proposed system is IOT-based wellbeing observing framework for mature people. This contraption can screen mature people from any space in the world and nearly all experts can assist them with the required help. This endeavor uses sensor advancement and the web to confer. It uses a heartbeat sensor and temperature sensor which are connected to the Arduino-Uno board.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116080790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信