{"title":"Smart Door System to Prevent COVID-19 Transmission","authors":"Hasit Trivedi, Sanjay Parmar, S. Gajjar","doi":"10.1109/ICICT57646.2023.10134100","DOIUrl":"https://doi.org/10.1109/ICICT57646.2023.10134100","url":null,"abstract":"The whole world has been witnessing a colossal adversary in the form of Coronavirus disease (COVID-19). With its super-fast spread, it has devastated a major part of the world and found to be the most dangerous virus of the 21st Century. Most of the countries went into lockdown to control the spread of the virus, and the economy shattered. Then slowly and gradually, some workspaces, malls, and public places started opening with the strict guidelines of governments. However, the fear of COVID-19 does not allow us to get back to our everyday lifestyle. Amongst the various symptoms observed in COVID-19-infected humans, the rise in body temperature is the most common symptom. As coronavirus is highly infectious, it is crucial to avoid physical contact with infected people to prevent the virus's spread. The primary reason for the spread of the virus is a lack of hygiene and a proper system to monitor the symptoms. Thus, the development of smart security systems for early symptom identification at the entrance of public places is essential to stop transmission. This paper covers designing a smart door system that measures the body temperature without human intervention and regulates people's entry through a mechanized door using Arduino UNO Board, IR thermometry temperature sensor, PIR sensor, and servo motor. The system will open the door only if the person seeking entry is normothermic, and if a person is hypothermic, it will trigger the alert system, which will eventually prevent the transmission of the virus.","PeriodicalId":126489,"journal":{"name":"2023 International Conference on Inventive Computation Technologies (ICICT)","volume":"1 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128691088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Yellamma, Sai Siva Kathera, D. S. V. S. U. S. S. N. Sarma, Yasaswin Palukuri
{"title":"Centralised Concurrency of Medical Records","authors":"P. Yellamma, Sai Siva Kathera, D. S. V. S. U. S. S. N. Sarma, Yasaswin Palukuri","doi":"10.1109/ICICT57646.2023.10134315","DOIUrl":"https://doi.org/10.1109/ICICT57646.2023.10134315","url":null,"abstract":"Personal Health Records (PHR) are emerging as an option to integrate patients' health data to provide a comprehensive picture of patients' state. However, when dealing with a range of electronic health systems from healthcare facilities, integration is not a trait that can be taken for granted. The patient-defined privacy policies must be followed while accessing sensitive PHR data. These should be considered while designing PHR architecture and modern technology should be utilized. Scalability, accessibility, and elasticity are properties of a modern technology known as cloud computing. The scoping review for PHR systems that are integrated, reliable, and cloud-based is presented in this study.","PeriodicalId":126489,"journal":{"name":"2023 International Conference on Inventive Computation Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130589340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vanajaroselin E Chirchi, Chettiyar Vani Vivekanand, N. V. A. Grace, R. Saranya, S. Venkataramana, K. Praveena
{"title":"Context Monitoring of Patients using Wireless Network","authors":"Vanajaroselin E Chirchi, Chettiyar Vani Vivekanand, N. V. A. Grace, R. Saranya, S. Venkataramana, K. Praveena","doi":"10.1109/ICICT57646.2023.10134482","DOIUrl":"https://doi.org/10.1109/ICICT57646.2023.10134482","url":null,"abstract":"In many hospitals, doctors attend to patients either once or twice per day. A situation may arise in which the patient's health worsens during the time if a doctor is unavailable to the patient, and the patient may die as a result. Most problems in today's world are caused by a lack of efficient therapy and appropriate monitoring within the required time period. To solve these issues with the current method, this research study proposes a health monitoring framework using wireless technology, in which the patient's health is followed and communicated to the physician throughout the entire day. The Internet of Things (IoT) is an emergent technology that uses wireless networking phenomenon to transmit data. The advantage of using IoT-based healthcare monitoring systems is that they can assess many physiological characteristics of the human body and is simpler, more accurate, and more precise than traditional methods. Sensors are utilized to measure the patient's bodily functions over a wireless network. The data from the sensors is gathered and communicated to the cloud through a Wi-Fi module linked to the microprocessor. The data is stored in the cloud, and feedback mechanisms are done on the stored data, which may be analyzed distantly by a physician. Virtual monitoring relieves doctors' workload and offers patients accurate health conditions. The proposed system results suggest that the physiological sensor is more effective in terms of availability and portability. The proposed system is easy to use, will save money, and will change how hospitals work in the future.","PeriodicalId":126489,"journal":{"name":"2023 International Conference on Inventive Computation Technologies (ICICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123618801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ganesana Charishma, C. Krishna, Tummala Sai Lasya, Sangana Venkata Mounika
{"title":"Novel COVID-19 Prediction Model in Python Using FB Prophet","authors":"Ganesana Charishma, C. Krishna, Tummala Sai Lasya, Sangana Venkata Mounika","doi":"10.1109/ICICT57646.2023.10134151","DOIUrl":"https://doi.org/10.1109/ICICT57646.2023.10134151","url":null,"abstract":"Since end of 2019, the coronavirus disease has spread quickly to nations all over the world. This has had a huge impact on many nations' economies and also on the global health system. As there is no effective treatment for cure, it's indeed vital to foresee COVID situations ahead to make the appropriate plans. Despite the fact that there are many models for predicting COVID-19, none of them have predicted for a specific number of days i.e., 30 days or 90 days or 1 week. To address this issue, the proposed study employs the Facebook prophet model for the job of COVID-19 case predictions using Python over the following thirty days. The prophet is a data-driven time series projecting technique using an incremental approach that matches non-linear tendencies with annual, monthly, and everyday periodicity and vacation impacts.","PeriodicalId":126489,"journal":{"name":"2023 International Conference on Inventive Computation Technologies (ICICT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114069237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Production Line Control System based on ASI Communication Considering Machine Vision","authors":"Lan Jiang, Yao Zhang","doi":"10.1109/ICICT57646.2023.10134265","DOIUrl":"https://doi.org/10.1109/ICICT57646.2023.10134265","url":null,"abstract":"Because of its mature technology, simplicity, reliability and low cost characteristics, the ASI bus system will soon become an international standard, so it will be widely used and then greatly developed in automation and low-voltage switching electrical systems. Inspired by this, the paper proposes the intelligent production line control system based on the ASI communication considering machine vision. In the designed system, 2 aspects of innovations have been considered: (1) In the novel ASI bus system, the serial two-way digital communication method is adopted between the host computer and the slave computer. It will improve the robustness of the system. (2) The image processing model is based on the idea that the histograms of many images have high gray distribution intensity near the image gray mean. The real-time information with the segmentation is considered to conduct the efficient modelling. In the experiment section, the visualize results are presented and the robustness test is conducted.","PeriodicalId":126489,"journal":{"name":"2023 International Conference on Inventive Computation Technologies (ICICT)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127895159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. C. Jullie Josephine, S. Ebenezer, S. Amutha, C. Srivenkateswaran, Jayamabelrani, Munuswamy
{"title":"Prevention of Spambot Injection in Web form on Cloud Platform","authors":"D. C. Jullie Josephine, S. Ebenezer, S. Amutha, C. Srivenkateswaran, Jayamabelrani, Munuswamy","doi":"10.1109/ICICT57646.2023.10133979","DOIUrl":"https://doi.org/10.1109/ICICT57646.2023.10133979","url":null,"abstract":"The primary goal of this Research is to identify preventative measures to halt spam that may occur in web applications hosted on cloud platforms. Many intrusion-based tactics, such as bot spamming in a cloud computing environment, can be used to spam web forms. Attackers frequently deploy spam-bots in advance modules as one of their methods for spamming cloud-hosted websites. A method of intrusion prevention is required to prevent these kinds of problematic situations from occurring in various ways. In the modern era, adding a honeypot field to the form is commonplace along with the captcha technique, which, while reducing the amount of spam, isn't entirely eliminating it. The goal of this project is to find a solution to problems that honeypot and captcha cannot solve. This can be overcome by generating a dynamic token and place it in the front end on the webpage. This prevents the spam bot from injecting the bad leads in the web form.","PeriodicalId":126489,"journal":{"name":"2023 International Conference on Inventive Computation Technologies (ICICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126362191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ResNet-18 comparative analysis of various activation functions for image classification","authors":"Gaurav Pandey, S. Srivastava","doi":"10.1109/ICICT57646.2023.10134464","DOIUrl":"https://doi.org/10.1109/ICICT57646.2023.10134464","url":null,"abstract":"Deep neural network and Machine learning are a latest emerging concept in the field of data science. Due to multi-layer hierarchical feature extraction in conjunction with control variables like number of hidden layers, activation functions, and variable parameters like learning rates, initial weights, and decay functions, deep network models perform better than machine learning techniques. While most of these parameter control the learning dynamics or complexity of representation a neural network can deal with, it is only activation function which introduces non-linearity in a network and current state of activation function poses multiple challenges to both practitioners and researchers some of which are: •Vanishing & Exploding gradients during back-propagation •Zero-mean and range of outputs •Compute complexity of function •Predictive performance Due to this reason our objective in current work in focused to explain with reasoning and experiments the landscape of activation functions available. According to a recent study, we have enough cutting-edge activation functions to modify the architecture of the well-known deep network model. Building on top of widely adopted ResNet-18 network architecture in this study. Subsequently, we evaluate the effectiveness of ResNet-18 for image classification using various activation functions.","PeriodicalId":126489,"journal":{"name":"2023 International Conference on Inventive Computation Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130104454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting the Application of Internet of Things (IoT) a New Wave of Technology for Smart Health Care","authors":"V. Manjula, C. Vijayabanu","doi":"10.1109/ICICT57646.2023.10134279","DOIUrl":"https://doi.org/10.1109/ICICT57646.2023.10134279","url":null,"abstract":"Healthcare is a fundamental aspect of human life. Furthermore, receiving high-quality medical care is highly essential. India is now facing various healthcare challenges due to a lack of resources. To define the concept of “smart healthcare,” this study discusses about the primary technologies before describing how it is presently being implemented across several key industries. Then, this study discusses about the challenges currently faced by smart healthcare. Finally, the future possibilities for smart healthcare are examined. The objective of this study is to comprehend the utilization of the Internet of Things, a new wave technology, to deal with healthcare related challenges. Finally, different IoT-based healthcare monitoring systems are comparatively analyzed. The limitations of IoT in healthcare, such as authentication, security, and wearability are examined, and ideas for future methodological approaches are presented.","PeriodicalId":126489,"journal":{"name":"2023 International Conference on Inventive Computation Technologies (ICICT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Capability on Smart Handheld Devices Using On-Device Machine Learning","authors":"Sivasankar Ramamurthy, G. Niranjana","doi":"10.1109/ICICT57646.2023.10134175","DOIUrl":"https://doi.org/10.1109/ICICT57646.2023.10134175","url":null,"abstract":"The current, most popular method for making edge devices intelligent relies on the cloud, where data is gathered from numerous device sources and uploaded. The developed model is then sent back to the device after being used to train a machine learning model in the cloud. The device then uses this trained model & becomes even more intelligent. Given recent developments and a growth in the number of smart devices with improved hardware capabilities, there is an increasing interest in using machine learning on the edge device itself rather than learning in the cloud. Hardware vendors are promoting AI-enabled chipsets that offer improved processing capabilities better tailored to computer vision, IoT, and machine learning based applications and solutions that benefit end users, which is further fostering this interest. This idea also reduces the overhead of offloading data to the cloud every time & also solves the security concern of user data being offloaded to the cloud. This way an enhanced security will be assured for user data and reduce overall latency for certain time-critical machine learning applications. This research study has surveyed the benefits and challenges of implementing Machine learning algorithms on edge devices by paying special attention to how techniques are adapted or designed to execute the resource-constrained devices.","PeriodicalId":126489,"journal":{"name":"2023 International Conference on Inventive Computation Technologies (ICICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130470932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yadagiri Vamsi Krishna, Gudipudi Jahnavi, Medam Tharun, Sravya Geethika Yegineti, G. Raja, B. Suneetha
{"title":"Survey: Analysis of Security Issues on Social Media using Data Science techniques","authors":"Yadagiri Vamsi Krishna, Gudipudi Jahnavi, Medam Tharun, Sravya Geethika Yegineti, G. Raja, B. Suneetha","doi":"10.1109/ICICT57646.2023.10134391","DOIUrl":"https://doi.org/10.1109/ICICT57646.2023.10134391","url":null,"abstract":"Social Media has its own risk just like any other media, whether it's resisting targeted phishing attempts, seeking to protect business accounts from hacking, preventing fraud, or defending against social engineering scams like account hacking. It is hard to give social media security for accompanying business or for a privatized account. Social media security is the act of analyzing data from social media platforms that have recently become active so that the user can protect himself from consequences. Even though social media networks have security settings, some with ulterior motives nevertheless manage to obtain pivotal personal details. The data is collected from the user and analyze it for the future aspect by using machine learning techniques.","PeriodicalId":126489,"journal":{"name":"2023 International Conference on Inventive Computation Technologies (ICICT)","volume":"369 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134129532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}