2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)最新文献

筛选
英文 中文
Smart Glasses for Visually Impaired Using Image Processing Techniques 使用图像处理技术的视障人士智能眼镜
P. Karthikayan, R. Pushpakumar
{"title":"Smart Glasses for Visually Impaired Using Image Processing Techniques","authors":"P. Karthikayan, R. Pushpakumar","doi":"10.1109/I-SMAC52330.2021.9640715","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640715","url":null,"abstract":"In this world, approximately 300 million are visually impaired, smart glasses helps the people who are Visually Impaired to enhance their life. With the help of this device they can navigate independently, feel convenient in the society, and also feel secure. They have many problems in their life, some of them are they cannot navigate independently, cheated in terms of money, Bus or Train number identification etc. In this system two features are implemented they are Currency Recognition and Traffic Light Detection. A Machine Learning (ML) Model is configured which consists of Convolution Neutral Network (CNN), image processing techniques, and Object detection model. Currency recognition extracts both visible and hided marks on the money for effective classification. Traffic light detection uses an image processing algorithm with standard object recognition methods. This system helps the Visually Impaired to cross the road without other's help. For the first feature i.e. Currency recognition, the output is the value of the currency that person has in his/her hand and for the second feature i.e. Traffic light detection, the output is whether the traffic light is red or green, if it is green then the number of seconds that person has to cross the road.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124257453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Malware Multi Perspective Analytics with Auto Deduction in Cybersecurity 网络安全中带有自动推理的恶意软件多视角分析
S. Srinivasan, P. Deepalakshmi
{"title":"Malware Multi Perspective Analytics with Auto Deduction in Cybersecurity","authors":"S. Srinivasan, P. Deepalakshmi","doi":"10.1109/I-SMAC52330.2021.9640803","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640803","url":null,"abstract":"Machine Learning involves conceiving algorithms that enable computin The corporates and enterprises success are increasingly dependent on technology, system security, and its infrastructure. The corporates are committed to secure millions of customer’s data, clients, employees and other stakeholder’s information. Due to the increasing number of securities breaches, it proves information security fiascos may consequence trendy of substantial damage to a company’s reputation and customer’s trust. Also, the corporates that lose a substantial amount of revenue parched may face fines for failing to protect customer information. Therefore, it is imperative that organizations have proper security measures in place. To certify the superior configuration among the enterprises information system security plans and protecting customer in-formation, this proposal launches security research called cybersecurity along with how the malware analytics support cyber security in the space of Securing Internet of Things (SIoT) domain. The research is focusing on cyber security which essentially focuses on protecting the information with various analytics with auto malware deductions. Malware auto detections and analytics helps multifaceted in the development of logical data sets which is the combination from small to large data sets which expose data in concealed forms, unidentified associations, and preferences of customers to establish the cybersecurity of their enterprise.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"1 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121008202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Impact of Strength Picture on Convolving with Regulation 强度图像对正则卷积的影响
K. Koti, Guna Sekhar Sajja, Dennis Arias-Chávez, R. Rajasekaran, Regin Rajan, D. Vijendra Babu
{"title":"Impact of Strength Picture on Convolving with Regulation","authors":"K. Koti, Guna Sekhar Sajja, Dennis Arias-Chávez, R. Rajasekaran, Regin Rajan, D. Vijendra Babu","doi":"10.1109/I-SMAC52330.2021.9640851","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640851","url":null,"abstract":"Image Deblurring is a common restoration issue. However, existing deep learning approaches have generalization and interpretability issues. This research work provides a framework capable of regulated, confidence-based noise removal in this project to address these issues. The framework is built on merging two denoised images, both of which were generated from the same noisy input. One of the two is denoised using generic algorithms (for example, Gaussian), making few assumptions about the input images and generalizing across all cases. The other uses deep learning to denoise data and performs well on known datasets. Also, this research work presents a series of strategies for seamlessly fusing the two components in the frequency domain. Also, this research work presents a fusion technique that protects users from out-of-distribution inputs and estimates the confidence of a deep learning denoiser to allow users to interpret the result. Further, this research work will illustrate the efficacy of the suggested framework in various use cases through experiments.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125261423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic Analysis of High Throughput Traffic on Tor 基于Tor的高吞吐量流量分析
G. Mani, P. Srinivas, G. Rao, Chitturi Prasad, Donepudi Priyanka, Naresh Cherukuri
{"title":"Traffic Analysis of High Throughput Traffic on Tor","authors":"G. Mani, P. Srinivas, G. Rao, Chitturi Prasad, Donepudi Priyanka, Naresh Cherukuri","doi":"10.1109/I-SMAC52330.2021.9640934","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640934","url":null,"abstract":"Tor is a popular anonymity network used by millions to access internet services while maintaining their privacy. The main concept behind Tor is that a user can build a \"circuit\" of routers called relays, where each relay carries the client’s traffic to the next relay, without any single relay knowing the full extent of the path. Thus, anonymity is achieved, because no single relay can trace the client to the destination.However, a paper written in 2005 titled \"Low-Cost Traffic Analysis of Tor\" by Steven J. Murdoch and George Danez is demonstrated that a traffic analysis attack was possible against the Tor network. Any attacker could monitor the load on a relay in the Tor network by calculating the round trip time (RTT) to the relay, and when the RTT spiked, it was clear that the relay was being used. With this information, attackers could trace the path of a client in the Tor network and de-anonymize them.This paper was written in 2005, when Tor was still young. At the time of Murdoch and Danezis’ paper, the entire Tor network consisted of just fifty relays. As of the time of writing, there were well over 7,000 relays in the network, so the ecosystem of Tor is radically different. With all of the increased traffic, it is highly required to determine if this type of attack was still valid, and would not be masked by other traffic.Our results indicate that if a victim is downloading or streaming a large file as fast as Tor will allow them to, a decrease in bandwidth and an increase in round trip time (RTT) is usually observable on each relay in the circuit. This research work has also discovered the Tor guard relays, a special subset of relays that clients will pick as the first hop in their circuit are very susceptible to this kind of attack.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"439 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116019077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Affective Music Player for Multiple Emotion Recognition Using Facial Expressions with SVM 基于支持向量机的面部表情多重情感识别情感音乐播放器
Supriya L P, Rashmita Khilar
{"title":"Affective Music Player for Multiple Emotion Recognition Using Facial Expressions with SVM","authors":"Supriya L P, Rashmita Khilar","doi":"10.1109/I-SMAC52330.2021.9640706","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640706","url":null,"abstract":"Affective computing is a form of machinery that enables the machine to respond to a human stimulus in some way, usually associated with sophisticated mood or emotional indications. This emotion based music player project is a novel approach that helps the user play songs automatically based on the user's emotions. This understands user's facial emotions and plays the songs according to their emotions. Music as a major impact on the regular life of human beings and in innovative, progressive technologies. Generally the operator needs to do with the challenge of looking for songs manually navigate through the playlist to choose from. At this point it suggests an effective and precise model, which would produce a playlist constructed on the user's present emotional state and behavior. Existing strategies to mechanize the method of creating the playlist are computationally moderate, less solid and some of the time includes the utilization of additional hardware. Discourse is the foremost antiquated and ordinary way of communicating considerations, feelings, and temperament and it requires tall specialized, time, and taken a toll. This proposed framework is based on extricating facial expressions in real-time, as well as extricating sound highlights from tunes to decipher into a specific feeling that will naturally produce a playlist so that the fetched of handling is moderately low. The Emotions are recognized using Support Vector Machine (SVM) . The webcam captures the user's image. It then extracts the user's facial features from the captured image. The music will be played from the pre- defined files, depending on the emotion.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"27 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114059939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Application of Digital Party Building Cloud Platform based on C# and Opencv 基于c#和Opencv的数字党建云平台的设计与应用
Xue‐cheng Bian
{"title":"Design and Application of Digital Party Building Cloud Platform based on C# and Opencv","authors":"Xue‐cheng Bian","doi":"10.1109/I-SMAC52330.2021.9640858","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640858","url":null,"abstract":"Party building is the core driving force to lead the work of grass-roots tax departments forward. Strengthening the party building of grass-roots tax departments plays an extremely important role in promoting the tax cause. In this form, the party's grass-roots construction is also in a major transformation stage. The government, state-owned enterprises and colleges all attach great importance to the management of the construction of grass-roots party organizations. The software development environment of this system is visual studio 2015 and opencv 3.4.2. The core code is written by C + +, and the software interface is written by C #. In this paper, many cases are tested and the test results are counted. The test results show that the system can accurately detect and track moving targets.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114157697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-cost Robot for Autonomous Disinfection of Corridors 用于走廊自动消毒的低成本机器人
Sandhya Vidyashankar, G. Srinivasa
{"title":"Low-cost Robot for Autonomous Disinfection of Corridors","authors":"Sandhya Vidyashankar, G. Srinivasa","doi":"10.1109/I-SMAC52330.2021.9640952","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640952","url":null,"abstract":"The rise of COVID-19 has precipitated an increased importance of cleaning and sanitation, ideally without human intervention. This paper proposes a solution to meet this emerging need by means of a low-cost fully autonomous robot equipped with pumps for sanitation spray. The robot is designed for disinfection of corridors such as those in grocery stores, hotels etc., using the readily available peroxide disinfectant. It is controlled using an Arduino Uno and can efficiently avoid obstacles. For further convenience, the robot design is modular to ensure protection of the electronics as well as ease of charging and unskilled operation.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114458281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accurate Breast Cancer Detection and Classification by Machine Learning Approach 基于机器学习方法的乳腺癌准确检测与分类
D. Sandeep, G. Bethel
{"title":"Accurate Breast Cancer Detection and Classification by Machine Learning Approach","authors":"D. Sandeep, G. Bethel","doi":"10.1109/I-SMAC52330.2021.9640710","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640710","url":null,"abstract":"In this paper there is comparison of four different machine learning algorithms such as Convolutional Neural Network (CNN), Recurrent Neural Network (RNN), Fuzzy logic and Genetic algorithm on Wisconsin Breast Cancer Diagnosis (WBCD) dataset for the detection of breast cancer in women. The test accuracies are compared to show the efficient algorithm for the detection of breast cancer using those algorithms. The dataset is partitioned to 70% training data and 30% testing data. The results for the applied algorithms are CNN acquired 96.49% accuracy, RNN acquired 63.15% accuracy, fuzzy logic acquired 88.81% accuracy, and genetic algorithm acquired 80.399% accuracy.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Swarm solar rooftop system using 6 DoF parallel manipulators and two axes linear movement 蜂群太阳能屋顶系统采用六自由度并联机械手和两轴直线运动
Soham Parlikar, Gauri Karnik
{"title":"Swarm solar rooftop system using 6 DoF parallel manipulators and two axes linear movement","authors":"Soham Parlikar, Gauri Karnik","doi":"10.1109/I-SMAC52330.2021.9640721","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640721","url":null,"abstract":"Solar energy is an emerging source of electricity in today’s world, and It has been playing an eminent role in generating maximum energy to comply with everyday needs. Solar energy totally depends on the sun’s irradiation and the various sun path angles, so to achieve maximum efficiency, the solar panels need to be facing the direction with maximum solar irradiation. As solar panels are mainly placed on the top of buildings or terraces, to retain the elegance of the building, solar panels can be arranged in specific dynamically arranged patterns, which can be used to visualize the waving effect. This paper proposes a novel method to incorporate the use of 6 DoF parallel manipulators attached to linear movable XY axes, to achieve the tracking of sun path for gaining maximum efficiency and to depict various visual motions such as waves, swarm movement of solar panels in terms of architectural efficacy.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122210656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Research-Oriented Mathematical Model for Cloud Simulations 面向研究的云模拟数学模型
Moin Hasan, Mohammad Anwarul Siddique
{"title":"A Research-Oriented Mathematical Model for Cloud Simulations","authors":"Moin Hasan, Mohammad Anwarul Siddique","doi":"10.1109/I-SMAC52330.2021.9640902","DOIUrl":"https://doi.org/10.1109/I-SMAC52330.2021.9640902","url":null,"abstract":"Cloud computing draws immense attraction of the researchers worldwide. It has now become a base paradigm of almost every growing organization. To carry out fruitful research, rigorous experimentation is always required. Commercially, large-scale cloud data centers consist of tens of thousands of physical servers to fulfil the users’ requests across the globe. Therefore, it is not feasible for every researcher to conduct the research experiments and test their proposed algorithms/methods/frameworks over the real cloud environment. Alternately, simulation experiments can be performed. To perform the simulation experiments, standard and research-oriented mathematical modelling of the cloud architecture is required which can be easily implemented using any of the programming languages. To this requirement, this article discusses such a mathematical model of cloud computing architecture consisting of different cloud entities. The discussed model can be easily implemented using any programming language or simulator to perform the research experiments.","PeriodicalId":178783,"journal":{"name":"2021 Fifth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117097747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信