2023 8th International Conference on Communication and Electronics Systems (ICCES)最新文献

筛选
英文 中文
Handling Secret Key Compromise by Deriving Multiple Asymmetric Keys based on Diffie-Hellman Algorithm 基于Diffie-Hellman算法的多重非对称密钥泄露处理
2023 8th International Conference on Communication and Electronics Systems (ICCES) Pub Date : 2023-06-01 DOI: 10.1109/ICCES57224.2023.10192607
Jatin Arora, Kamal Saluja, S. Gupta, Suvarna Sharma, Gaganpreet Kaur
{"title":"Handling Secret Key Compromise by Deriving Multiple Asymmetric Keys based on Diffie-Hellman Algorithm","authors":"Jatin Arora, Kamal Saluja, S. Gupta, Suvarna Sharma, Gaganpreet Kaur","doi":"10.1109/ICCES57224.2023.10192607","DOIUrl":"https://doi.org/10.1109/ICCES57224.2023.10192607","url":null,"abstract":"A collection of connected things or nodes that collect information and send it through communication channels is known as the Internet of Things (IoT). Maintaining the confidentiality and integrity of the transferred data is crucial in many applications. As a result, protection of private data from security risks is a top priority for IoT based applications. IoT objects are typically energy-constrained computing and storage devices. Therefore, during the communication of devices, authentication among devices is necessary. A public-private key is created and utilized for the duration of the session without taking into account the possibility of loss to an adversary. Once the key has been compromised, there is no way to know when it has been lost, and the attacker can read every message. This severe security lapse went on for a longer period of time undiscovered. Revoking the key and creating a new key, which is not advised to do frequently, is the only defense against this security breach. An alternative solution to this problem is deriving a new key at communicating sites rather than exchanging keys among them. The performance of the key-sharing algorithm to perform the key exchange is measured based on the time required to encrypt/decrypt and derive the key at the node.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121586863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Rake Receiver using Rayleigh Fading Channel in Terms of Bit Error Rate 基于误码率的瑞利衰落信道Rake接收机性能评价
2023 8th International Conference on Communication and Electronics Systems (ICCES) Pub Date : 2023-06-01 DOI: 10.1109/ICCES57224.2023.10192621
Bhavya Sai Boppudi, Venkata Raghavan, Rama Lakshmi Ambati, Vijaya Sankar, S. Geetha, Sravani Beeram
{"title":"Performance Evaluation of Rake Receiver using Rayleigh Fading Channel in Terms of Bit Error Rate","authors":"Bhavya Sai Boppudi, Venkata Raghavan, Rama Lakshmi Ambati, Vijaya Sankar, S. Geetha, Sravani Beeram","doi":"10.1109/ICCES57224.2023.10192621","DOIUrl":"https://doi.org/10.1109/ICCES57224.2023.10192621","url":null,"abstract":"The fastest-growing sector of the communications is wireless communication. Yet, the wireless environment is quite unstable, and fading is the main disadvantage. Several pathways are taken by the signal as it moves from the transmitter end to the receiver end. This causes the transmit signals to be received at the receiver in numerous versions, which results in multipath propagation. There will be variations in the attenuations, phases, and travel delays of each of these signals. By combining them with a Rake Receiver, this issue can be resolved. It is a radio receiver created with the intention of reducing multipath fading’s negative impacts. Rake receiver employs several fingers, sometimes referred as correlators, to individually identify the M strongest multipath components. Each received signal is corrected for delays before being fed to the combiner and equalizer. The weighted outputs of the M correlators are then used to determine demodulation and bit decisions. Using Bit Error Rate, this technique’s performance will be assessed.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133914103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building an Intelligent Aerial Surveillance System through Deep-learning based Object Detection 基于深度学习的目标检测构建智能空中监视系统
2023 8th International Conference on Communication and Electronics Systems (ICCES) Pub Date : 2023-06-01 DOI: 10.1109/ICCES57224.2023.10192714
B. Janakiramiah, Sitha Ram Bethala, Prasanna Chandrika Chereddy, Geethika Ambi, C. Mohan
{"title":"Building an Intelligent Aerial Surveillance System through Deep-learning based Object Detection","authors":"B. Janakiramiah, Sitha Ram Bethala, Prasanna Chandrika Chereddy, Geethika Ambi, C. Mohan","doi":"10.1109/ICCES57224.2023.10192714","DOIUrl":"https://doi.org/10.1109/ICCES57224.2023.10192714","url":null,"abstract":"The article discusses the challenges involved with detection of vehicles with aerial pictures and methods used to overcome these challenges. Aerial images present unique challenges, such as smaller size of vehicles & intricate backgrounds. Traditional approaches such as sliding window and feature extraction have limitations in accurately detecting vehicles in aerial images. Deep learning models like R-CNN, Faster R-CNN, & Mask R-CNN were proposed & demonstrated exceptional performance. However, there remain challenges in their direct application to vehicle detection in aerial images. Modifications were proposed to overcome these challenges, including improvements to region projected network & classifier and the use of instance segmentation in addition to object detection using bounding boxes. The article highlights the need for large aerial picture real-time detection and the importance of accurate vehicle recognition from aerial photographs in various applications, including urban planning and traffic management.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134324226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of Smart Security Key for Knowledge based Authentication 基于知识认证的智能安全密钥设计与开发
2023 8th International Conference on Communication and Electronics Systems (ICCES) Pub Date : 2023-06-01 DOI: 10.1109/ICCES57224.2023.10192626
Sivaranjani P, S. S, Ragul R, Riyazur Razak N, Saran V T
{"title":"Design and Development of Smart Security Key for Knowledge based Authentication","authors":"Sivaranjani P, S. S, Ragul R, Riyazur Razak N, Saran V T","doi":"10.1109/ICCES57224.2023.10192626","DOIUrl":"https://doi.org/10.1109/ICCES57224.2023.10192626","url":null,"abstract":"Ensuring the safety of passwords has always been a paramount concern for online users, however, numerous individuals still become a victim of identity theft due to the presence of multiple attack types such as brute-force, phishing, and dictionary attacks. These attacks can compromise the users' accounts, and dictionary attacks seem to be the most prevalent. To improve security and safeguard the privacy of users, a new methodology is proposed that involves a sophisticated digital key incorporating cutting-edge biometric and fingerprint sensor technologies along with embedded cryptography. This key generates passwords that are distinct and sturdy, which are impervious to cracking, and utilizes the Advanced Encryption Standard (AES) algorithm to encrypt and decrypt them. This mechanism offers a new means of securely managing passwords with less user intervention and a heightened level of security compared to traditional authentication techniques.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134397499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Direct Torque Controlled Induction Motor Drive for Electric Vehicles Application 电动汽车用直接转矩控制感应电机驱动
2023 8th International Conference on Communication and Electronics Systems (ICCES) Pub Date : 2023-06-01 DOI: 10.1109/ICCES57224.2023.10192731
Thangalakshmi s. Dr., M. Padmarasan, V. Sridevi, K. S. Kavitha Kumari
{"title":"Direct Torque Controlled Induction Motor Drive for Electric Vehicles Application","authors":"Thangalakshmi s. Dr., M. Padmarasan, V. Sridevi, K. S. Kavitha Kumari","doi":"10.1109/ICCES57224.2023.10192731","DOIUrl":"https://doi.org/10.1109/ICCES57224.2023.10192731","url":null,"abstract":"Manufacturers are now very interested in the motorization control of commercial Electric Vehicles (EVs). This paper describes an Induction Motor (IM) control methodology used in EV applications. Motor drive control is critical in EVs, and IM-based drives are better suited for EVs. For IM drives, there are essentially vector and scalar control techniques. Low performance is a disadvantage of the scalar control approach, but Direct Torque Control (DTC) is an excellent approach for IM speed control by effectively controlling the torque and flux. The alternating current (AC) is taken as a source and connected to a rectifier circuit. However, the functioning of the Voltage Source Inverter (VSI) with variable switching frequency might be determined by the availability of hysteresis controls for torque and flux. The DTC-controlled IM drive is developed in MATLAB/ Simulink tool and the performance of the motor is evaluated by the obtained results. The motor’s torque and speed response are examined.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131536409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Approach of Data Encryption Algorithm for Securing Big Data 保护大数据的数据加密算法创新方法
2023 8th International Conference on Communication and Electronics Systems (ICCES) Pub Date : 2023-06-01 DOI: 10.1109/ICCES57224.2023.10192702
Shivani Awasthi, Narendra Kohli
{"title":"Innovative Approach of Data Encryption Algorithm for Securing Big Data","authors":"Shivani Awasthi, Narendra Kohli","doi":"10.1109/ICCES57224.2023.10192702","DOIUrl":"https://doi.org/10.1109/ICCES57224.2023.10192702","url":null,"abstract":"Nowadays, a large amount of data that is growing exponentially is known as Big data. In other words, big data contains more variety and comes in big volume with more velocity. Traditional processing software cannot handle complex and big amounts of data, but this data addresses a lot of business problems, that could not be able to tackle before so to deal with this data, open-source software HDFS (Hadoop Distributed File System) is used as a cloud storage system. Big Data Security is a collective term used for all measures and tools that are used to guard data and analytics processes used for accessing the data. Big data is a joint term and tool for data and data management systems against attacks, thefts, or other malicious activities that could harm or negatively affect them so server and serverless systems both are major concerned with high security of data. The author’s research presents data security in the cloud computing environment in this paper. HDFS does not provide any scheme of encryption and decryption for securing the data, HDFS act as a storage medium that stores data in Avro format. Users use the encryption key and encryption zone to encrypt their data into HDFS.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131694667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Analysis of Mental Stress using Machine Learning Techniques 使用机器学习技术的心理压力预测分析
2023 8th International Conference on Communication and Electronics Systems (ICCES) Pub Date : 2023-06-01 DOI: 10.1109/ICCES57224.2023.10192635
Nongmeikapam Thoiba Singh, Richa Dhiman, P. Luthra, Shefali Goyal
{"title":"Predictive Analysis of Mental Stress using Machine Learning Techniques","authors":"Nongmeikapam Thoiba Singh, Richa Dhiman, P. Luthra, Shefali Goyal","doi":"10.1109/ICCES57224.2023.10192635","DOIUrl":"https://doi.org/10.1109/ICCES57224.2023.10192635","url":null,"abstract":"Many stress-related health problems can be avoided if mental stress is identified early. It is critical to have reliable techniques for detecting human stress quickly and accurately. This study aims to measure physiological indicators and recognize mental fatigue using a wrist-worn sensor gadget. A group of healthy individuals were exposed to three distinct stresses. The electrocardiogram, breathing, skin conductivity, and EMG of the trapezius muscles were all monitored throughout the operation. These data were used to calculate 19 physiological parameters. A subset of nine characteristics was chosen for further analysis once the feature values had been normalized, and correlations between these features were examined. Through the use of principal component analysis, these nine characteristics were reduced to seven principal components. It was discovered that by using these primary components in conjunction with a number of classifiers, a classification accuracy of approximately 90% could be maintained between stressful and non-stressful conditions. This indicates that a potentially useful feature subset may have been discovered, which can be used in the future to construct a personalized stress monitor. When using these strategies, obtaining the best characteristics is never going to be an easy task. As it focuses on the binary classification problem, this work will employ the Bernoulli Naive Bayes method, one of the best classification algorithms. An attempt is made to identify the optimal set of features that maximizes classification accuracy.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131845545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing EV Charging in Battery Swapping Stations with CSO-PSO Hybrid Algorithm 基于CSO-PSO混合算法的换电站电动汽车充电优化
2023 8th International Conference on Communication and Electronics Systems (ICCES) Pub Date : 2023-06-01 DOI: 10.1109/ICCES57224.2023.10192757
S. Rajkumar, P. Nagaveni, A. Amudha, M. Siva Ramkumar, G. Emayavaramban, T. Selvaganapathy
{"title":"Optimizing EV Charging in Battery Swapping Stations with CSO-PSO Hybrid Algorithm","authors":"S. Rajkumar, P. Nagaveni, A. Amudha, M. Siva Ramkumar, G. Emayavaramban, T. Selvaganapathy","doi":"10.1109/ICCES57224.2023.10192757","DOIUrl":"https://doi.org/10.1109/ICCES57224.2023.10192757","url":null,"abstract":"Electric vehicles (EVs) and renewable energy sources have gained increasing popularity as people become more concerned about climate change and sustainable energy future. Battery swapping stations are a viable alternative for faster and more convenient EV charging, while B2G technology can help to maintain the grid’s energy input and output. The effective scheduling of charging and battery switching with B2Goperation is a challenging task that necessitates efficient optimization methods. This study proposes a hybrid optimization approach based on cuckoo search and particle swarm optimization (CSO-PSO) for the JCS of EVs using B2G technology in BSS. By establishing the ideal charging and swapping schedule for each EV and optimizing the B2Goperation based on demand and price, the proposed solution intends to increase the efficiency and cost-effectiveness of battery swapping stations. The proposed method has the advantages of attaining faster convergence, more accuracy, and better space solution exploration. The approach’s efficacy and applicability are proved by simulation results, which indicate the algorithm’s efficiency in real time.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130970781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comprehensive System for Automated Pothole Detection and Vehicle Speed Management using CNN Technology 基于CNN技术的凹坑自动检测与车速管理综合系统
2023 8th International Conference on Communication and Electronics Systems (ICCES) Pub Date : 2023-06-01 DOI: 10.1109/ICCES57224.2023.10192629
N. Gangatharan, Swetha Reddy A, Saravanan C, Sairam Sathvik I V, Sabarish G, Sharun Krishnan U
{"title":"A Comprehensive System for Automated Pothole Detection and Vehicle Speed Management using CNN Technology","authors":"N. Gangatharan, Swetha Reddy A, Saravanan C, Sairam Sathvik I V, Sabarish G, Sharun Krishnan U","doi":"10.1109/ICCES57224.2023.10192629","DOIUrl":"https://doi.org/10.1109/ICCES57224.2023.10192629","url":null,"abstract":"Roadside potholes raise maintenance costs for road officials while causing serious harm to vehicle and endangering the safety of drivers and passengers. In this study, we use Convolutional Neural Network (CNN) technology to suggest a complete system for automatic pothole recognition and vehicle speed management. A pothole detection module and a vehicle speed control module are the two major parts of our system. A CNN-based algorithm is used by the pothole recognition module to evaluate the images. The model is trained to recognize potholes and identify them apart from other roadside characteristics. The vehicle speed control mechanism receives an information when a pothole is found. On a dataset of actual road images, the proposed model is tested and the potholes are identified with an accuracy of 99.56%. The proposed system provides a useful and effective solution for pothole recognition and vehicle speed control, which can help reduce accidents, save money on maintenance, and enhance the driving experience in general.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132861445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence based Healthcare Chat Bot System 基于人工智能的医疗聊天机器人系统
2023 8th International Conference on Communication and Electronics Systems (ICCES) Pub Date : 2023-06-01 DOI: 10.1109/ICCES57224.2023.10192727
Akash Goel, Satyam, Shubham Sharma
{"title":"Artificial Intelligence based Healthcare Chat Bot System","authors":"Akash Goel, Satyam, Shubham Sharma","doi":"10.1109/ICCES57224.2023.10192727","DOIUrl":"https://doi.org/10.1109/ICCES57224.2023.10192727","url":null,"abstract":"Machines are becoming capable of performing tasks like humans in this age of Artificial Intelligence. The most vital as pect of living a healthy life is health care, and the most difficult aspect is finding a doctor's consultant. Everyone cannot afford to visit a doctor for every health issue. The objective of the proposed research work is to design or build a Healthcare chat bot in AI to assist in determining the patient's health and providing basic information before contacting a doctor, but only for minor issues. Using a medical chat bot will save healthcare costs while also increasing medical knowledge. Chat bots are computer programs that employ AI and ML to connect with people. The chat bot system retrieves the query from the database that the user has requested and makes a judgement based on it before presenting the responses.","PeriodicalId":442189,"journal":{"name":"2023 8th International Conference on Communication and Electronics Systems (ICCES)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133044693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信