Sign In to Follow Application
View All Documents & Correspondence

Integration Of Cloudcomputing With A Lichen Identification Automation System Through Computational Techniques.

Abstract: Utilizing a microcontroller-based machine learning algorithm, cloud computing is integrated with an automated lichen identification system through computational methods. is made clear. Using an LCD Display module (108), a register module (201), and the system (100), an administrator and a user are registered. The registered admin and registered user have access to a set of actions that can be taken on files shared in a database (101) using a storage medium (110). Furthermore, a WIFI Send module (205) is used by the system (100) to collect input and allow the registered administrator to view the comments.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
06 December 2023
Publication Number
52/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

K S Rangasamy College of Technology
K S R Kalvi Nagar Tiruchengode 637 215

Inventors

1. Dr.B.G.GEETHA
Department of Computer Science and Engineering K S R Kalvi Nagar Tiruchengode 637 215
2. Dr. P.Ponmurugan
Department of Botany Bharathiyar University Coimbatore 641046
3. Dr.PUNTEHAAPRABHU
DEPARTMENT OF BIO TECHNOLOGY K.S.RANGSAMY COLLEGE OF TECHNOLOGY TIRUCHENGODE 637215
4. G.AMSAVENI
DEPARTMENT OF BIO TECHNOLOGY K.S.RANGSAMY COLLEGE OF TECHNOLOGY TIRUCHENGODE 637215

Specification

DESC:The writing that follows
covers the suggested mode of one representation of the current research. It is clear from the research report that the provided image has not only been specially tailored to it, but has also undergone multiple revisions and representations. Because of this, the current findings should be viewed as explanatory rather than subjective. While many adjustments and alternative constructions are considered, the research is not intended to be limited to the particular section offered. Rather, the study is intended to cover all adaptations, alternative constructions, and equivalents that fall within the claims' description of the research's scope.
In any of the aforementioned examples, the terms "comprising," "comprises," and similar expressions (which are synonymous with "including," "having," and "characterized by") may be substituted with the closed terms "consisting of," "consists of," and similar expressions.
Unless otherwise noted as exemplifying the singular exclusively, the singular terms "a," "an," and "the" in the text that follows reflect both the singular and the plural.
FIG. 1 shows how cloud computing and an automated lichen identification system are integrated using computational techniques. As a depiction of the present investigation suggests, the system is 100; thus, "system 100." According to a recent study, the system 100 may allow a user to remotely and automatically find out the locations of various lichen species. The system 100 may also restore the shared file's availability, confidentiality, and integrity (the CIA triad), according to a recent study example. Multilevel encryption may be used by system 100 in the current study simulation to ensure the availability, confidentiality, and integrity of data stored in databases, which is known as the CIA triad. According to an overview of the available research, the system 100 can be installed in a variety of environments, including offices, hospitals, colleges, universities, defense or military settings, and so on. The main goal of the description of the current research is to cover or meet any area where the system 100 might be used, including areas for more recent and related areas for more advanced approaches.
Database 101, Controller 102, Processor 103, Power Supply 104, Battery 105, Computer Vision Camera Device 106, 4G Trans Receiver 107, LCD Display 108, WIFI Module 109, and Storage Medium 110 are possible components of system 100, according to a diagram of the current research.
A summary of the current research indicates that the controller capable of executing computing operation 102 might be a tool used by the user to perform various operations on memory-stored files, sensors, LCD displays, 4G Trans receivers, computer vision cameras, and WIFI modules. A synopsis of the ongoing research suggests that the user may utilize the controller, which is capable of computing operation 102, as a tool to carry out different operations on sensors, memory-stored data, computer vision cameras, LCD screens, 4G transceiver, and WIFI modules. An administrator may also use the controller 102 to carry out a variety of operations on the sensor files as an illustration of the ongoing investigation. The user's set of activities may include, for example, adding or changing files, reading from or writing to files, sharing or deleting files, removing files, changing the read-write status of files with respect to sensors, and so on, according to a summary of the current research. A summary of current studies suggests that the controller capable of performing computation operation 102 may be a tool used by the user to control data that is kept in memory, as well as sensors, relays, LCD panels, 4G Trans receivers, and WIFI modules. As an example of the ongoing investigation, an administrator can also perform various actions on the sensor files using the controller 102. A summary of the current study states that the user's set of activities may include, among other things, adding or modifying files, reading from or writing to files, sharing or deleting files, removing files, altering the read-write status of files with regard to sensors, and so forth. The controller device 102 could be an end user device, an embedded computer device, or something else entirely. The purpose of Representation of the Current Research is to encompass all forms of computing equipment, including previous sophisticated methods and/or recognized, associated, and/or related art. Although it is not necessary, an Arduino-based device represents one option for the embedded computing device as it relates to current research. Any type of embedded device is included in or covered by current study representations, regardless of whether it is well-known, associated with already-existing artwork, or related to later technological advancements.
One camera or multiple cameras integrated into a single, integrated unit may make up the Camera 106. In order to identify lichen species, the current research representation aims to cover all types of computer vision cameras, including AI-based cameras, as well as pertinent literature and/or newly developed camera technologies. The camera will use libraries packaged as microcontroller libraries as an example of ongoing research. The camera gets its sense of the current state from data that it receives from sensors. The sensors used in Representation of Current Research are positioned in various locations for identification with the intention of continuously gathering data over a predetermined period of time. The time is chosen by the user and may change dynamically depending on the environment. Depending on which power source is available, either Battery 105 or Power Supply 104 will provide the computer vision camera with the required amount of watts of power. This decision is based on an instruction that has already been loaded into memory and is ready for the processor to process.
Software programs like file managers, embedded programs, healthcare programs, and the like might be included in the controller device 102, according to a Representation of the Current Research. A preferred depiction of the current research suggests that one potential component of the controller device 102 is the 4G Trans receiver 107, which could be computer-readable software and hardware installed in the device for system 100-related operations. The memory that the user was given to use with System 100 is where the data stored in the 4G Trans receiver module is read. The system may or may not handle the creation of 4G Trans receiver data and the loading of data onto memory modules. Users of System 100 are free to log in to the system using the current RFID-based authentication method. With the embedded application, users can load data onto their RFID access cards.
In one implementation of the Current Research, the user registration module 201 may offer a user-related interface for controlling the system 100 after the user logs in. In one embodiment of the Current Research, the user registration module 201 may offer an admin-related interface for managing the system 100 when the administrator logs in. By looking at flag values, the admin user can determine which computer vision cameras are available and connected to the system. Additionally, admin users calibrate computer vision cameras on a regular basis in accordance with the calibration guidelines established by the user organization. Every system component produces data, which is subsequently kept for computation in an internal database. This database can be routinely checked by an admin user to ensure that the data is accurate and that it originates only from sensors, meaning that it does not come from any other external sources, such as the annoying noise that is produced when electromagnetic interference (EMI) is present in the vicinity. Once the connected power supply's data has been stored in a database, the system will automatically adjust itself based on the power source. The system administrator has the option of carrying out the change manually or automatically. Many pre-loaded methods in the Display Application 204 are used by the automatic process. The algorithms are iterative processes for decision-making based on various attributes of the system. The algorithm uses the data produced by the various cameras to determine which power supply modification is appropriate. The admin user also adds other users to the system so that they can periodically check on the different parts of the system. The process of adding new users involves not only figuring out how the organization will carry out its policies, but also adding system functionality and cramming instructions into a small memory footprint. According to A Representation of the Current Research, database 101 may contain data uploaded by users, administrators, computer vision cameras, and sensors. It is also feasible for the data that an administrator stores in database 101 or that a computer vision camera shares with another component to serve as a representation of the most recent study. Additionally, the user and administrator may be able to perform a number of actions on the shared and/or stored files via the database 101. The files that are shared and/or stored in database 101 are subject to a number of user actions. Adding, editing, reading, sharing, deleting, and controlling the files' read-write and write permissions are just a few examples of these actions. Any actions that the user may take on the shared and/or stored files in database 101 are meant to be included in or covered by the current research representation. The administrator's set of actions may include, but are not limited to, viewing a list of the user(s) who are permitted access to the file, devices, and sensors; granting or denying the user(s) access to the file; viewing a record of the actions the user(s) have taken with respect to the file, devices, and sensors; and so on. Any actions the administrator takes in relation to the shared and/or saved files in database 101 are meant to be covered by Representation of the Current Research. In one implementation of the current research, the controller 102 may have the processor 103 installed on it. Representation of the Current Research suggests that the controller 102 may be a mainframe, a linked board, or a motherboard, among other possibilities. Any form of controller 102, including well-known, closely related works of art and/or later developed technology, is intended to be covered by or included in Representation of the Current Research in some manner.
One use for the current research could be to mount the processor 103 on top of the controller 102. The processor 102 may be configured to provide computer-readable instructions and output related to system 100. Based on Representation of the Current Research, the processor 103 could be a microprocessor, PLC, development board, or anything else. All processor types, whether known already, included in related art, or developed later, are intended to be covered by or included in Representation of the Current Research.
A Representation of Current Research suggests that storage medium 113 might contain programming modules, which are composed of computer programmable instructions. In one implementation of the current research, the storage medium 113 might be a non-transitory storage medium. In one implementation of Current Research, the processor 102 may be used to carry out a set of computer-readable instructions stored on the storage medium 113.
One implementation of the Current Research states that, upon receiving the necessary data from the controller 102 regarding the administrator and the user, respectively, the registration module 201 may be configured to register the administrator and the user on the system 100 via the application. According to Representation of the Current Research, the admin details and the user details could consist of, but not be restricted to, an identifying name, a password, a name, a designation, a clearance level, an email identity, a contact number, and so forth. Representation of the Current Research is meant to contain or otherwise encompass the admin and user details that the registration module 201 may get from the admin and user, respectively, through the controller 102.
According to one implementation of the Current Research, the identity name and password that are generated could consist of a string of characters. Representation of the Current Research states that the character could be any type of character, including special, numeric, alphabetical, and more. A password and identity name can be generated by the User Registration Application 201 and can contain any combination of characters, including those from related art and/or later invented technologies.
Using the password and identifying name supplied by the registration module 201, the administrator and user may be able to access the Lichen Finder Application 202 following a successful registration. In one aspect of the Current Research, the administrator may see the user-related interface and the user-related interface, respectively, after logging into program 203. In one implementation of the Current Research, the registration module 201 may send an activation signal to the CV Camera 106 to turn it on after a successful login.
To allow the registered admin and registered user to carry out the specified actions on files shared in the database 101, the registration module 202 may be set up in compliance with a particular implementation of the Current Research. Depending on the requirements of the camera upgrade, installing a new camera or updating files related to the camera may be required. Periodically, upgrading means getting new cameras for every one of the old ones or upgrading specific camera components. The calibrated values of a camera show whether or not its firmware needs to be updated. The registered administrator can change the camera focus values to ensure accurate and error-free data storage.
Additionally, the registration module 201 may send a feedback signal to turn on the LCD Display 108 after the registered admin and/or registered user have finished the series of actions on the files shared in the database 101. Admin users can alter the feedback text and have access to pre-populated feedback codes. The instructions that activate the LCD Display 108 module contain all of the codes. The LCD display unit's monochromatic black and white color scheme helps users stay on task. The LCD panel's blue backdrop light allows users to operate the device day or night. There are four fixed lines on the LCD display, and depending on the situation, these lines are used to display various messages received from System 100. For the LCD display and its connected components to operate effectively in a working environment, periodic calibration is required. An appropriate LCD display unit is installed along the system after taking the surroundings, such as the heat and other factors, into account. Temperature is a crucial factor to take into account when configuring the right LCD display, which will allow the user to execute various system functions based on feedback.
One implementation of the Current Research might set up the WIFI module 109 so that the registered user can use the WIFI transmit program 205 to provide feedback (such as their experiences with the system 100 and suggestions for enhancements). In an alternative Current Research implementation, the WIFI module 205 might be set up so that the registered administrator can examine the feedback that the registered user has provided through the registration application 201. The System 100 control application, which includes the WIFI Send application 205, is one of several applications. The program will send and receive data in accordance with pre-stored instructions on a storage medium that contains comprehensive information about system step-by-step instructions. The admin user has access to the Send and Receive feature and can grant any number of System 100 users permission to use it as well. The admin user can use the feedback mechanism to calibrate various system-connected sensors and other devices, ensuring that there are no significant functional limitations on the system as a whole. By gathering periodic flag values, the multidimensional feedback method integrates sensor data and user feedback, giving managers a more comprehensive picture of the accuracy of the system.
A flowchart of a method 200 for a machine learning algorithm 100 based on an integration of cloud computing with lichen identification automation system through computational techniques is shown in FIG. One implementation of the Current Research, 2.
Using the built-in card reader, the Lichen Finder application will read the user's unique data in step 202 and compare it to the data in Database 101. The user will be prompted to log in again using LCD Display 108 if the information provided by the built-in card for user authentication differs from the information currently in Database 101. Concurrently, the flag value is examined to confirm that the internal card is not experiencing any technical or physical problems that are impeding its operation. If a flag value indicates that the reader is having problems, the system administrator will be notified via a feedback mechanism provided by the WIFI Send program 205. The user is provided with inaccurate information about an inbuilt card reader failure with the assistance of LCD Display 109. User information can be added to a database using a number of different components provided that the data in Database 101 is compatible with the integrated User Authentication. When LCD Display 108 receives the control signal first, it determines when to operate the camera 106 based on the values of the open and close flags. The relay may actually run the motor for a predetermined period of time if the flag value is set closely enough, giving the user the impression that the device is alerting. When the motor stops, the operation flag value is set based on the previous value, and the database is alerted that the operation was successful right away. Control can be instantly switched to a different camera optimized for a specific lighting situation by the Lichen Finder application 202. Data is sent from the camera to Lichen Finder program 202, which subsequently sends it to LCD Display 108. Once the data has been transmitted, the software sends it to Database 101 for archiving and later use. The loom data collection application's user can understand historical health status data for both the current and past periods within the same system by applying filters. It accomplishes this by retrieving information from Database 101 regarding a specific loom's past health status and presenting it to them in various lines. The instruction that has already been loaded into memory will update the data in the database on a regular basis.
System 100 users can use the user registration application 201 to add more users at step 201. The different users are adjusted in accordance with organizational policy rather than being fixed in the short memory, which retains data from multiple sources. Using a special keyboard, the admin user can enter user data, which will show up on the LCD display unit as feedback. With our solution, the administrator can view the user file that is kept in memory for additional customizations and add users directly through programming. You must provide the information needed for user validation and authentication when adding a new user. After the user enters the data, it is sent to an application where it can be stored in a database. A file called the database is kept in the memory block. To send the data to storage that is set aside in a remote location for backup applications, the registration application also makes use of a WiFi transmit application. With the help of the user registration modules, which let the admin user enter information about numerous sensors and their calibration parameters with just one module, the admin user can add or remove sensors that will be used for different detection jobs.
At step 203, the 4G Trans receiver Data Collecting application reads the camera data and provides it to the database and LCD display. To make sure the linked camera is reading data correctly and that there are no performance issues, the Lichen Finder application also verifies the camera's flag value. By taking into account the operational environment, sensor functionality, and organizational requirements, the administrator establishes the unit size of the camera data. Database 101 can now be read and written to by the Lichen Finder application and the built-in camera, allowing them to continuously add data to the database. The speed sensor application sends data to an LCD display and gives the user information about the vehicle's speed and values. [47] In step 204, the Display Application 204 is used to display information about various System 100 parameters to users at different levels. The main job of a display unit is to gather data from various system modules and provide it to the user so they can make decisions. To give users multiple pieces of information, the display application interfaces directly with Display 108. The controller 102 retrieves common data, such as power information or battery status. In addition to the WIFI connection, other parameters are shown in the Display application, such as the memory current capacity. Every user will see the information exactly the same way because it is general purpose information. User-specific information is derived directly from the user and is based on the Lichen Finder Application 202. The data that the module receives includes data that has already been entered by the user and the integrated card, as well as data that already exists in the database. The current display application 204's sole responsibility is to gather information from multiple sources and inform users about various actions associated with smart vehicle operation.
In step 205, data is sent to a remote host via a wireless signal using the WIFI deliver program. The implementation organization's WIFI signal is necessary for the module to function. System 100 can operate without this optional module in all circumstances. This module handles the backup procedure, which is stored offsite from the system environment. A lot of stakeholders use the WIFI transmit module's feedback mechanism to learn more about the system. The WIFI transmit module, which can send and receive data from Database 101, can be connected to all system components. With the aid of this module, the system will manage all data communication tasks with the external environment.
Integrated Card Reader 111, which is in charge of confirming user and lichen module information, is built upon the embedded card reader shown in Figure 1. Cards that are built-in are used for user authentication. The Inbuilt Card and its functions are also a part of the system, even though different operating conditions might call for different Card strategies. Following data receipt from the built-in reader, the microcontroller will process the information according to various settings that are used to carry out various system control operations.
,CLAIMS:We assert that:
1. Cloud computing is integrated with an automated system for identifying lichens using computational methods.
The system (100) is made up of a processor (103) that is positioned on a controller (102) and a storage medium (110) that holds programming instructions that the processor (103) can execute. The storage medium (110) also has a registration module (201) that is configured to register a user and an administrator on the system (100) via an application (201) by giving the controller (102) access to the data. A Lichen Finder application (202) is set up to perform a number of actions on files shared in a database (101) by the registered admin and registered user and a WIFI module (205) configured to: enable the registered user to submit feedback about their experience with the system (100) and recommendations for its improvement (201) via the registration application (201); enable the registered admin to view the feedback that the registered user has submitted via the LCD Display (108).
2. The system (100), as stated in claim 1, permits the use of any combination of an email address, phone number, designation, clearing level, password, and identifying name as admin and user details.
3. The registered user can perform addition, modification, reading operation, sharing, removal, read-write status, and/or a combination of these actions on the files shared on the database (101) using the system (100) mentioned in claim 1.
4. According to Claim 1, the database (101) on the system (100) is stored on a server database.
5. Claim 1 states that the system (100) allows the registered administrator to choose between allowing the user to view a list of registered users who have been granted access to the file, blocking the user from accessing the file, allowing the user to access the file, viewing a list of operations the user has performed on the file, or any combination of these options.
6. A method (201) that consists of the following steps to manage devices with smart functionality: giving the administrator and registered user access to shared files in a database (101); allowing the administrator and registered user to register on the system (100) through an LCD application (108) by providing administrator and user information, respectively, through a controller (102); and allowing the registered user to submit feedback, including information about their experience with us.
7. The procedure (200) mentioned in claim 6, where the admin information and user data are chosen using an identity name, password, name, designation, clearance level, electronic mail identification (E-Mail ID), contact number, or a combination of the aforementioned.
8. The procedure (200), as mentioned in claim 6, wherein the registered user chooses which operations to perform on the shared files on the database (101), including addition, modification, reading, sharing, removal, and read-write status.
9. The procedure (200) outlined in claim 6, which makes use of the server-hosted database (101).

Documents

Application Documents

# Name Date
1 202341083093-PROVISIONAL SPECIFICATION [06-12-2023(online)].pdf 2023-12-06
2 202341083093-FORM 1 [06-12-2023(online)].pdf 2023-12-06
3 202341083093-DRAWINGS [06-12-2023(online)].pdf 2023-12-06
4 202341083093-COMPLETE SPECIFICATION [06-12-2023(online)].pdf 2023-12-06
5 202341083093-OTHERS [07-12-2023(online)].pdf 2023-12-07
6 202341083093-FORM-9 [07-12-2023(online)].pdf 2023-12-07
7 202341083093-FORM 18 [07-12-2023(online)].pdf 2023-12-07
8 202341083093-EDUCATIONAL INSTITUTION(S) [07-12-2023(online)].pdf 2023-12-07
9 202341083093-DRAWING [07-12-2023(online)].pdf 2023-12-07
10 202341083093-COMPLETE SPECIFICATION [07-12-2023(online)].pdf 2023-12-07
11 202341083093-FER.pdf 2025-05-01

Search Strategy

1 searchE_12-06-2024.pdf