2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)最新文献

筛选
英文 中文
BlockID: Blockchain based Digital ID and Authentication System for Privacy Improvement blockkid:基于区块链的数字身份和认证系统,用于隐私改进
Tejaas Solanki, Kundan Patel, Swanand Pande, Anant V. Nimkar
{"title":"BlockID: Blockchain based Digital ID and Authentication System for Privacy Improvement","authors":"Tejaas Solanki, Kundan Patel, Swanand Pande, Anant V. Nimkar","doi":"10.1109/ACCESS57397.2023.10199733","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10199733","url":null,"abstract":"With every industry finding better applications of blockchain, it has become increasingly essential to explore its potential. Security and immutability are some of the properties of blockchain that make it very popular among companies moving to decentralized systems. An architecture for user identity management system based on blockchain that backs authentication has been proposed in this paper. A simulation justifies the use of blockchain for identity purposes. This provides a way to use this system in many industries such as storage of medical health records, a means to provide SSO ability, etc. Basic authentication of a user can take place in matter of seconds and the best part of such a system is that a user is in control of their identity.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124610037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement Learning based Energy Management system for Hybrid Electric Vehicles 基于强化学习的混合动力汽车能量管理系统
Vishnu Narayanan A, Rubell Marion Lincy G, Parvathy Gopakumar
{"title":"Reinforcement Learning based Energy Management system for Hybrid Electric Vehicles","authors":"Vishnu Narayanan A, Rubell Marion Lincy G, Parvathy Gopakumar","doi":"10.1109/ACCESS57397.2023.10200701","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10200701","url":null,"abstract":"Hybrid Electric Vehicles (HEV) (Self-charging Hybrid Vehicles) have been exemplified as the timely, practical, balanced solution for fuel-efficiency and eco-friendly environment. Considering the design perspective of the powertrain, the different strategies employed for Energy Management have depicted vast improvements in the energy efficiency of the hybrid powertrain models. With companies like deep-mind promoting Reinforcement Learning (RL) with the human-level efficiency to task multi-games, RL-based algorithms have been arduously researched to develop Energy Management System (EMS) owing to the capability to self-learn interacting with any complex environment by the return in rewards for each action. The recent research proved this to be on a larger efficient scale compared to the predefined algorithms. This article reviews the different powertrain models and their working along with some basic RL algorithms for any alterations from the pre-existing models to improve the efficiency and develop the easiness of the management system. Ample importance is given to the classification of EMS, and the primary EMS created using RL in this review. A model for the EMS is also discussed along with the results. The future scope of work is also discussed.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"1 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120997656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tumour region detection in MR brain images using MFCM based segmentation and Self Accommodative JAYA based optimization 基于MFCM分割和自适应JAYA优化的MR脑图像肿瘤区域检测
S. Natarajan, V. Govindaraj, Pallikonda Rajasekaran Murugan, Yudong Zhang, Arunprasath Thiyagarajan, Kiruthika Uma
{"title":"Tumour region detection in MR brain images using MFCM based segmentation and Self Accommodative JAYA based optimization","authors":"S. Natarajan, V. Govindaraj, Pallikonda Rajasekaran Murugan, Yudong Zhang, Arunprasath Thiyagarajan, Kiruthika Uma","doi":"10.1109/ACCESS57397.2023.10201006","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10201006","url":null,"abstract":"Many medical image-based diagnostics, particularly the diagnosis of brain tumours in Magnetic Resonance Imaging (MRI), heavily rely on multi-region segmentation. This work's major objective is to improve the multi-region detection performance by combining a modified Fuzzy C-Means (FCM) with a self-accommodative JAYA (SAJAYA) algorithm. Due to its capacity to choose the number of cluster heads in the FCM stage and population suitability in the optimization stage, this technique is more successful and considerably facilitates the precise MR brain image segmentation. To achieve the best performance, SAJAYA is employed to optimize segmentation variables and reduce the overall computation time and complexity. The proposed algorithm segments the different informative sections, such as cerebrospinal fluid, grey matter, and white matter, which will be most helpful to investigate and characterize the tumour. The experiment's findings show that the suggested algorithm is successful in terms of sensitivity, specificity, accuracy and other benchmark metrics.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114425525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Encryption Through Aperiodic Josephus Permutation And Novel Cyclic Shift Operation 基于非周期约瑟夫置换和新型循环移位运算的图像加密
Asha J. Vithayathil, A. Sreekumar
{"title":"Image Encryption Through Aperiodic Josephus Permutation And Novel Cyclic Shift Operation","authors":"Asha J. Vithayathil, A. Sreekumar","doi":"10.1109/ACCESS57397.2023.10201106","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10201106","url":null,"abstract":"In recent years, chaos based cryptography has become a prevalent and efficient way to secure digital images because of the similarities between chaotic properties and the traits needed for encryption. This paper proposes an image encryption algorithm combining a chaotic map, Josephus problem, cyclic shift operation, and XOR operation. The proposed encryption procedure follows the traditional permutation-substitution or confusion-diffusion structure. Here, the Henon map and the novel key generation phase generate image-sensitive chaotic streams, which are used for permutation and diffusion. The aperiodic Josephus permutation and bit-level chaotic cycle shift method accomplish the permutation stage by altering the position and value of each pixel. And this proposed permutation thwarts statistical cryptanalysis by dropping the correlation between neighboring pixels to approximately equal zero. The substitution stage is achieved with modulus and XOR operations on the scrambled image and the chaotic matrix. We compare the proposed method with other recent image encryption algorithms in the simulation experiment and security analysis, and the results confirm that the proposed method has better performance and higher security.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129827731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ArmVision: An Approach to Improve Police Officers Response Times to Gun Violence and Put a Stop to Armed Crimes Before They Occur ArmVision:一种改善警察对枪支暴力的反应时间和在武装犯罪发生之前制止它们的方法
Vinay Venkatesh
{"title":"ArmVision: An Approach to Improve Police Officers Response Times to Gun Violence and Put a Stop to Armed Crimes Before They Occur","authors":"Vinay Venkatesh","doi":"10.1109/ACCESS57397.2023.10199210","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10199210","url":null,"abstract":"An estimated 19,223 people lost their lives due to gun violence in 2020. ArmVision prevents arm related crimes before they occur and brings quicker attention to them if they do with its efficient notification system. Its wide range of applicability expresses a bright future for its development. ArmVision uses a complex machine learning (ML) algorithm called You Only Look Once (YOLO) and Convolutional Neural Networks (CNNs) to optimize its performance.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121833261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancement of Energy Efficiency using Improved Energy Efficient Routing Protocol in Wireless Sensor Networks for IoT Applications 在物联网应用的无线传感器网络中使用改进的节能路由协议提高能效
J. Sravanthi, B. V. Subbayamma, Waseem Sultana, Sriram Parabrahmachari, V. G. Krishnan, Yadavalli S S Sriramam
{"title":"Enhancement of Energy Efficiency using Improved Energy Efficient Routing Protocol in Wireless Sensor Networks for IoT Applications","authors":"J. Sravanthi, B. V. Subbayamma, Waseem Sultana, Sriram Parabrahmachari, V. G. Krishnan, Yadavalli S S Sriramam","doi":"10.1109/ACCESS57397.2023.10199858","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10199858","url":null,"abstract":"The optimization of energy conservation and the span of the system are the important obstacles to establishing and managing the function of wireless sensor networks. Grouping is an efficient strategy for modifying the load, synchronizing the structure with the associated order, and lengthening the system's life. In a cluster-based system, hot spots arise because the group leader that is closer the sink soon runs out of energy. To resolve this challenge, numerous uneven grouping strategies have been suggested. These strategies have the limitation of overburdening the group leader with endpoints that enter the identical cluster. Hence, in order to strengthen the functionality of a group, we provide a strategy in this research called fuzzy logic - based imbalanced grouping. Generated statistics is used to examine the intended study. The recommended strategy is contrasted with two existing heuristics: LEACH, which employs an analogous grouping strategy, and EAUCF, which employs an asymmetrical grouping strategy. The MATLAB simulation findings illustrate that the recommended strategy performs superior than the other two strategies.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123078096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incentive Mechanism for Mobile Crowd Sensing Using Reverse Auction Dynamic Pricing and Recent History 基于反向拍卖动态定价和近期历史的移动人群感知激励机制
Jowa Yangchin, N. Marchang
{"title":"Incentive Mechanism for Mobile Crowd Sensing Using Reverse Auction Dynamic Pricing and Recent History","authors":"Jowa Yangchin, N. Marchang","doi":"10.1109/ACCESS57397.2023.10199720","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10199720","url":null,"abstract":"Mobile crowd sensing is a technique that allows collection of real-time data from a large number of mobile users who carry a mobile device with sensing capabilities. It is widely used for data sensing applications, such as traffic monitoring, environmental monitoring, health and fitness, retail marketing, and emergency response. It requires individual users to perform the sensing task based on the location of the task and the user. Ensuring privacy and security of individuals and accuracy and reliability of the data collected are primary challenges in a mobile crowd sensing system. To motivate more users to collect data, it is required for the system to be built in a manner that each user is rewarded for the task done while maintaining the budget balance. As users are of heterogeneous nature, they must be rewarded for the task done based on their own true valuation of the task. The reverse auction method for mobile crowdsensing is becoming one of the widely used incentive mechanism for its choice to the mobile users, who act as the participating workers, for fixing the price for which they want to sell the sensed data. For a reverse auction system to work, it is required that there are enough users who are willing to bid in an auction round. Maintaining a participant pool with enough competition while keeping the bid values near to true values is a key challenge to be addressed. Failing to maintain enough participants can result in higher bid prices with each round and hence increasing total reward value to be distributed. This may lead to incentive explosion where the bid price is too high for the available budget. In this work, we propose a novel approach of retaining users by considering the frequency of winning and participation of users. This mechanism is built on top of RADP-VPC which is reverse auction mechanism based on reverse- auction with dynamic pricing with virtual participation credit. The experimental results show that the proposed approach using participation history for each user performs better than RADP-VPC in terms of retaining users and incentive explosion.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124665850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-channel, compact DAQ system with inbuilt Time-to-digital converters 多通道,紧凑的数据采集系统与内置时间到数字转换器
K. Prasad, V. Chandratre, M. Sukhwani, R. Shinde
{"title":"Multi-channel, compact DAQ system with inbuilt Time-to-digital converters","authors":"K. Prasad, V. Chandratre, M. Sukhwani, R. Shinde","doi":"10.1109/ACCESS57397.2023.10201167","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10201167","url":null,"abstract":"this paper describes the aspects of the multi-channel, compact data acquisition systems (DAQs), developed to characterize the front-end electronics (FEE) of the resistive plate chamber detectors (RPCs) being used in India-based neutrino observatory (INO) experiment. The number of RPCs and FEE boards required in the experiment are 29000 and 464000 respectively. It is required to characterize the FEEs along with RPC detectors before the actual deployment in the experiment. The detector parameters that are to be measured for this characterization are strip (noise) rate, muon detection efficiency, and time resolution. Usually, commercial, rack mount level translators, scalars and time-to-digital converters (TDC) are being used to measure these parameters. In the DAQ system presented here, all these functionalities have been integrated in a single compact module thereby resulting in a low cost, multichannel, and compact DAQ system. This paper describes in detail the developmental aspects of 128-channel DAQ system built using Xilinx Spartan-6 FPGAs, ARM Cortex-M4 microcontroller and in-house developed ASIC and FPGA based TDCs. The DAQ system has Ethernet interface and USB interface for data transfer. The system is supported by detailed data analysis software to monitor and measure the parameters in real time. The DAQ is tested with different configurations of RPCs and FEEs. The strip rates of the order of 30 - 200 counts per seconds (CPS), detector efficiency of greater than 90% and timing resolution of 2.4 ns to 2.7 ns are measured using these DAQs.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121391969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brain Tumor Classification using MRI Image -A Survey 脑肿瘤MRI影像分类综述
Subha Thomas, R. Sudarmani
{"title":"Brain Tumor Classification using MRI Image -A Survey","authors":"Subha Thomas, R. Sudarmani","doi":"10.1109/ACCESS57397.2023.10200199","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10200199","url":null,"abstract":"The leading cause of cancer related mortality in both kids and adults is brain tumor. Through the examination of the abnormalities of the tumor's tissues and cells, a tumor may be divided into many stages. The acute risk of tumor growth and spread is provided by this stage. Biopsy can be used to assess the tumor grade. It should be mentioned that tumor grading differs from cancer stage classification. Due to their high complexity and wide variation, brain tumor types are particularly difficult to diagnose with great accuracy. This survey starts with the review of 25 papers on brain tumor classification. The varied models used in the papers are analyzed, which includes methods for segmentation, classification and optimization. The analysis on varied metrics is analyzed and their maximal performances are also examined. Finally, chronological review is performed along with existing challenges.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132758375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Gesture-Based Home Automation 基于视觉手势的家庭自动化
Biya Kurian, Jerom Regi, Dennis John, Hari P, Therese Yamuna Mahesh
{"title":"Visual Gesture-Based Home Automation","authors":"Biya Kurian, Jerom Regi, Dennis John, Hari P, Therese Yamuna Mahesh","doi":"10.1109/ACCESS57397.2023.10200895","DOIUrl":"https://doi.org/10.1109/ACCESS57397.2023.10200895","url":null,"abstract":"In recent years, there has been an increase in the use of IoT devices for home automation, shopping malls, and other public places. However, for individuals who are mute or bedridden, accessing these devices can be difficult, especially when they are voice-activated. To address this issue, hand gesture recognition technology has been developed to allow individuals to control these devices through simple hand movements. Image processing and pattern recognition are crucial for accurately detecting these hand gestures, and platforms such as Open CV, Python, PyCharm, and Media Pipe are commonly used in software development to achieve this. This technology has the potential to help people with physical, sensory, or intellectual disabilities to participate fully in all activities in society and enjoy equal opportunities. By using hand gestures to communicate with IoT devices, individuals who are deaf can also benefit from this technology. Ultimately, this technology has the potential to create a human-computer interaction that is accessible to all, making it a valuable addition to the field of assistive technology. Furthermore, hand gesture recognition technology is an excellent example of the potential of IoT devices to facilitate a more connected and automated world. However, it is important to note that with any new technology, there are also concerns around data privacy and security. As such, it is essential that developers prioritize ethical considerations and robust security protocols when designing these systems. Moreover, hand gesture recognition technology can be further improved through the use of artificial intelligence and machine learning. These technologies can help improve the accuracy of the recognition system and provide a more personalized experience for users. This system is highly reliable and user-friendly, and does not require any physical contact, which makes it highly suitable for disabled people. Furthermore, the development of new sensor technologies can also help increase the reliability and efficiency of the hand gesture recognition system. Overall, the development of hand gesture recognition technology is an exciting and innovative area of research that has the potential to improve the lives of many individuals, particularly those with physical or sensory disabilities. With continued advancements in technology, it can expect to see more sophisticated and accessible hand gesture recognition systems that will help create a more inclusive and accessible society.","PeriodicalId":345351,"journal":{"name":"2023 3rd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信