物联网技术Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053408
Abhishek Sebastian, Pragna R, G. S, A. R
{"title":"Design of Shark Detection and Decoy Buoys","authors":"Abhishek Sebastian, Pragna R, G. S, A. R","doi":"10.1109/IDCIoT56793.2023.10053408","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053408","url":null,"abstract":"Humans and wildlife negatively interact when there is a loss of property, livelihood, or even life; this interaction is referred to as a human-wildlife conflict. Defensive and retaliatory killing may lead to the eventual extinction of these species. One such conflict occasionally occurs near coastal areas between cold-blooded saline water creatures like sharks and people. This work presents a proof of concept for developing a buoy that can detect cold-blooded predators and serve as a decoy system to deter human attacks. The decoy system is based on numerous biological facts and information about shark species. The model can detect up to 14 species of sharks and saline crocodiles using pattern recognition with a collective accuracy of 92%. The designed buoy is a novel approach to prevent human attacks near the coast with its decoy system based on the factual behavior of the predatory shark species and crocodiles.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"7 1","pages":"667-674"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74144491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网技术Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053536
K. S. Suresh, T. Kamalakannan
{"title":"Circumvolution of Centre Pixel Algorithm in Pixel Value Differencing Steganography Model in the Spatial Domain","authors":"K. S. Suresh, T. Kamalakannan","doi":"10.1109/IDCIoT56793.2023.10053536","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053536","url":null,"abstract":"Sending and receiving sensitive information through any data channel is always a challenging task because of the enormous proliferation of the computer industry. Since steganography algorithms are routinely used to share data, cryptography algorithms have been around for the same objective for a long time, but these cryptographic algorithms are easily brute-forced. Furthermore, more research works have been focused on Steganography models. Initially, steganography models start with a simple LSB data insertion model, which accepts only a limited payload and is easily vulnerable. The PVD algorithms encapsulate more data than conventional LSB approaches whereas still affording a reasonable level of protection to private data. In order to find the set of pixels that can safely store more data bits using circumvolution of the centre pixel algorithm in the PVD domain. This model can embed more data bits when compared with the conventional LSB models. The Confidential data is protected with excellent security with double- layered information hiding. The suggested approach achieves good PSNR and MSE scores and keeps up great quality when more data is added to the stego-image.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"57 12","pages":"312-319"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72490629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网技术Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053508
S. P., Devadathan Menon, Dhruv Sharma, Ayush Dadsena
{"title":"Automated Hydroponics System to Study Nutrient Allocation and Plant Responses in a Controlled Environment","authors":"S. P., Devadathan Menon, Dhruv Sharma, Ayush Dadsena","doi":"10.1109/IDCIoT56793.2023.10053508","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053508","url":null,"abstract":"In nations like India, where agricultural production is the largest source of revenue, agriculture is troubled by many issues like limited and divided farmland/cultivation lands, manures, chemical fertilizer, pesticides, and seeds etc. Adding on, even the water resources fall short, which makes agriculture even more difficult and challenging. But with the increase in the rate of consumers as well as increase in their health consciousness, leads to the demand for quality and quantity of chemical-free agricultural products. Hence technology can come into the picture to resolve these issues. This article proposes a solution to solve the above-mentioned difficulties by using hydroponics along with IoT where hydroponics is a way of cultivating agricultural products that end up saving more water as well as can grow the plants in small areas when compared with traditional methods of farming. It can be done in any unoccupied space in the house or anywhere, such as a room, lobby, patio, balcony, or any other unused space. So hydroponics results in higher yield of crops when controlled and efficiently monitored, growth of the plants can be monitored from anywhere in the world using IoT so it is time saving. The hydroponics with IoT model can also be modified into a vertical fashion. This model allows people to go organic and eat chemical /pesticide free food.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84957283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网技术Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053412
R. M, P. R.
{"title":"Lightweight Cryptographic Approach to Address the Security Issues in Intelligent Applications: A Survey","authors":"R. M, P. R.","doi":"10.1109/IDCIoT56793.2023.10053412","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053412","url":null,"abstract":"With the origin of the Internet of Things (IoT),massive real-time applications are evolving, but in this cyber world, securing the data of those devices or users is to be focussed more on. Intelligent services are the base components of IoT applications, such as intelligent systems, smart homes, smart cities, smart cars, Etc. An unfold challenge is securing the large amount of data generated and transmitted over the network in the IoT ecosystem by resisting cyber-attacks and adopting the efficient cryptographic method for a resource-constrained environment. This paper focuses on the exhaustive work carried out on user/device identity and a lightweight cryptographic viable solution for the IoT ecosystem through ECC (Elliptic-curve cryptography). The study assures the secure transmission of data and authentication of device/user using various security strategies of ECC for real-time IoT applications. A systematic survey of the previous works is conducted to determine the critical aspects of designing ECC-based authenticated and secured transmission solutions for the IoT ecosystem. The outcome of this study is essential components of ECC, requirements, and solution architecture of ECC for various security aspects in the IoT ecosystem to ensure user/device privacy and secured data transmission and its challenges are addressed.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"79 1","pages":"122-128"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85517629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网技术Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053538
Mecline Jose F L, S. StewartKirubakaran, G. Paulraj, I. Jebadurai, Jebaveerasingh Jebadurai
{"title":"A Secure Data Sharing Framework with Blockchain in IoMT using Bald Eagle Search Optimization","authors":"Mecline Jose F L, S. StewartKirubakaran, G. Paulraj, I. Jebadurai, Jebaveerasingh Jebadurai","doi":"10.1109/IDCIoT56793.2023.10053538","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053538","url":null,"abstract":"In health information systems, present interoperability problems are solved by blockchain technology (BT). Moreover, blockchain technology offers the high-tech standard that assures a secure sharing of computerized healthcare information among healthcare providers, medical care organizations, individuals, and medical experts. In healthcare management, Internet of medical things (IoMT) devices can share sensory information from patients to be investigated and prepared. However, in IoMT devices the secrecy of patients’ health information transmission is still a major problem within a range of material regions. In order to overcome such challenges, an effective BES_SecDataSharing method is proposed for securely sharing the data with blockchain in IoMT. The entities involved in the proposed BES_SecDataSharing method are data owner, data user, cloud user, attribute authority, and blockchain. Six stages are involved in this proposed method are initialization phase, registration phase, key issuance phase, data preservation phase, authentication phase, and data sharing phase. The proposed BES_SecDataSharing methods has attained a minimum memory usage of 85 MB, validation time of 28.767 Sec, and normalized variance of 1.594. In addition, the method has obtained a maximum conditional privacy of 0.787.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"36 1","pages":"198-205"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82104008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网技术Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053548
Yu Shengwen, Kan Xi
{"title":"Intelligent Generation Algorithm for Multi-scene Virtual Images of Dynamic Pictures Based on Metaverse","authors":"Yu Shengwen, Kan Xi","doi":"10.1109/IDCIoT56793.2023.10053548","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053548","url":null,"abstract":"Beginning from the Facebook changed its name to Meta, the metaverse is then focused by the researchers. This research study follows the trend of intelligent generation algorithm for the multi-scene virtual images of dynamic images based on metaverse. Conditional generative adversarial networks add additional conditional information to the generator and discriminator, extending the structure of standard GANs. Hence, the GAN is considered as the integration algorithm. Through digital twin technology and Internet of Things technology, the expansion of the living environment is realized, and the real world and the virtual world are integrated to construct a comprehensive environment. Hence, the model is applied to the intelligent generation algorithm. The effectiveness has been evaluated through simulation.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"11 1","pages":"298-301"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84652749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网技术Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053461
A. P, Senthil Kumar A M, C. Vignesh, K. S
{"title":"Machine Learning Solution for Police Functions","authors":"A. P, Senthil Kumar A M, C. Vignesh, K. S","doi":"10.1109/IDCIoT56793.2023.10053461","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053461","url":null,"abstract":"In our society, crime has become one of the most prevalent problems. Preventing it is of paramount importance. In order to prevent it, crimes must be tracked and a public database must be maintained so that case histories can be retrieved when necessary in the future. This project is being proposed to reduce criminal activities by developing predictive models. From past experiments, many people have used deep learning methods to identify patterns of only one particular crime from past criminal activities that took place in different countries. In this research work, machine learning is being applied to predict the states which have high crime rates by analyzing the past crime data. Consequently, the police can focus on those areas where crimes are likely to occur. To predict this, machine learning algorithms like Decision trees and Random Forest algorithms were being used to classify and give accurate information.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"3 1","pages":"463-469"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80261912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网技术Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053460
K. Manikandan, G. Mathivanan
{"title":"An Intelligent Music Genre Classification Method with Feature Extraction based on Deep Learning Techniques","authors":"K. Manikandan, G. Mathivanan","doi":"10.1109/IDCIoT56793.2023.10053460","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053460","url":null,"abstract":"The music genre is a standard category that identifies some piece of music that belongs to a shared set of conventions. The physical musical albums are further replaced by digital music due to the varied interest. In order to enhance the efficiency and accuracy in digital music genre, deep learning technique is used. Deep learning is a type of machine learning and artificial intelligence which makes the process faster and earlier through training and learning process. This is an unsupervised learning technique that uses the way of automatic predictive analysis. It enhances to learn high level features from data in a sequential manner.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"107 1","pages":"902-907"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80711095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
物联网技术Pub Date : 2023-01-05DOI: 10.1109/IDCIoT56793.2023.10053485
S. G, S. S, S. S, Sai Dinesh P, Shashank Reddy P, Venkata Prasad M
{"title":"Handy Non-Invasive Blood Glucose Estimator using Arduino and NodeMCU","authors":"S. G, S. S, S. S, Sai Dinesh P, Shashank Reddy P, Venkata Prasad M","doi":"10.1109/IDCIoT56793.2023.10053485","DOIUrl":"https://doi.org/10.1109/IDCIoT56793.2023.10053485","url":null,"abstract":"People in almost every nation on the earth suffer with diabetes, a widespread chronic disease. Inspecting blood sugar values is imperative for augmenting the longevity of human life. Invasive testing is quite sore and nerve damaging. In this paper, the light obtained from the photo detector is utilized to assess the variance in glucose intensity, which is then employed for measuring the blood glucose content. The detected glucose value is shown on a Liquid Crystal Display (LCD) and also sent to a cloud server using the Node Microcontroller Unit (Node MCU) of the non-invasive embedded system implementation. The estimated glucose value is also sent to the mobile phone and coupled with ThingSpeak for portraying the analytics.","PeriodicalId":60583,"journal":{"name":"物联网技术","volume":"119 1","pages":"866-869"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75802291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}