2021 4th International Conference on Computing and Communications Technologies (ICCCT)最新文献

筛选
英文 中文
M-Health Technology Using IOT 使用物联网的移动医疗技术
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711869
R. Gayathiri, M. Nalini, R. Prabha, M. Nambiar Varsha, R. Archana, M. Nivetha
{"title":"M-Health Technology Using IOT","authors":"R. Gayathiri, M. Nalini, R. Prabha, M. Nambiar Varsha, R. Archana, M. Nivetha","doi":"10.1109/ICCCT53315.2021.9711869","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711869","url":null,"abstract":"Patients after an operation usually go through the recovery/rehabilitation process where they follow a strict routine. Recovery processes are done by PD (Pain Detector) sensors. After a major surgery as per the instruction from surgeon, patients must maintain a fixed position or else the patients supposed to fall down. The patient position level will be monitored by ADXL Sensor. MEMS generally consist of three position like x, y, z. If the patient position is changed and stress level rises after surgery, this will be viewed through the webserver, the information will be updated automatically and also it gives alert through buzzer. Due to this update nurses or Ward in charge can get alert without direct monitoring. PD (Pain detector) is standing for electrical conductance of the skin. sympathetic nervous system will cause strong emotion.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123044433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fake Product Detection using Blockchain 利用区块链检测假冒产品
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711899
P. Lavanya, N. Ananthi, K. Kumaran, M. Abinaya, B. Kalaivani, V. Krithika, S. Rahul
{"title":"Fake Product Detection using Blockchain","authors":"P. Lavanya, N. Ananthi, K. Kumaran, M. Abinaya, B. Kalaivani, V. Krithika, S. Rahul","doi":"10.1109/ICCCT53315.2021.9711899","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711899","url":null,"abstract":"The availability of fake product in the Market is one of the biggest challenges of the online retail industry. These products appear to be genuine but they are imitations of the original branded products. Almost 20% of the products sold on online websites are fake. In recent times, block chain is receiving more engagement and various applications are been emerged from this technology. In this paper, to ensure that consumers need not depend on the distributers to know whether their products are authentic or not, we are using the decentralized Block chain technology approach. We describe a decentralization Block chain network with anti-counterfeiting items, which allows producers to deliver items without having to run clear outlets, lowering product quality assurance costs dramatically.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127252741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of AI based Brain Tumor Detection and Diagnosis 基于人工智能的脑肿瘤检测与诊断分析
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711914
N. Shafana, A. Senthilselvi
{"title":"Analysis of AI based Brain Tumor Detection and Diagnosis","authors":"N. Shafana, A. Senthilselvi","doi":"10.1109/ICCCT53315.2021.9711914","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711914","url":null,"abstract":"Cancer is caused by uncontrolled cell development in any part of the body. Nowadays cancer is one of the fast growing diseases. Tumors appear in various forms, each with its own set of characteristics and treatment options. Primary and metastatic brain tumors are the two major forms of brain tumors. Detecting and diagnosing the tumor at the early stage can save the lives drastically. Now the fast growth of tumor, presently need research. As a result, scientists and researchers have been trying to develop advanced tools and methods for identifying tumor types and their stages. MRI (Magnetic Resonance Image) and CT (Computed Tomography) are the most commonly preferred modalities for detecting the tumors by re-sectioning and analyzing anomalies in brain tissue or location. Due to the benefits of Magnetic Resonance Image over Computer Tomography scan, the doctors are preferred to use the MRI modality. MRI is non-invasive imaging which is one among the deeply considered modality in the field of medical area network which explain how to distinguish the tumor from the MRI identification of a brain cerebrum. This analysis aims at presenting an overview about Brain Tumor Segmentation, Detection and Diagnosis using Deep Learning (DL), Machine Learning (ML), and Transfer Learning (TL) techniques. This analysis gives an outline of partially and fully automated segmentation techniques that are referred from the previous studies. The collection of the databases used for segmenting and classifying are tabulated in this article. The study blends the presentation of best-in-class approaches from standard segmentation and classification techniques with a quantitative analysis. The comparison mentioned in the articles would greatly provide a detailed summary about the brain tumor detection and diagnosis techniques.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recognizing Eminent Players from the Indian Premier League Using CNN Model 使用CNN模型识别印度超级联赛的杰出球员
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711881
V. Narmadha, S. Sneha, C. Vishali
{"title":"Recognizing Eminent Players from the Indian Premier League Using CNN Model","authors":"V. Narmadha, S. Sneha, C. Vishali","doi":"10.1109/ICCCT53315.2021.9711881","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711881","url":null,"abstract":"Sentiment analysis is a special technique of detecting the emotion or sentiment of the data. It is the practice of Natural language processing (NLP) plus Machine learning techniques to sort the data based upon emotions. Sentimental analysis's main objective is to collect an enormous amount of data from the source and apply suitable algorithms and techniques to analyze the sentiment of data. Sentimental analysis is advancing in the field of social media simultaneously with the progression of Artificial Intelligence. Cricket is a distinctive sport that is popular in most countries around the world. The Indian premier league (IPL) is a cricket game that is confronted by eight teams from eight Indian cities. Fan's comments on social media have become the major source for data analysis in the field of sports. Twitter is one of the most well-known social media, has greater than 330 million regular active users. The intention of this paper is to develop a CNN model to determine the famous IPL player by analyzing tweets from Twitter.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114913221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Diabetic Retinopathy and Its Causes Using Fuzzy C-Means Model 用模糊c均值模型分析糖尿病视网膜病变及其病因
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711840
T. Subha, N. Susila, R. Ranjana, V. Priya, V. Nithyashree
{"title":"Analysis of Diabetic Retinopathy and Its Causes Using Fuzzy C-Means Model","authors":"T. Subha, N. Susila, R. Ranjana, V. Priya, V. Nithyashree","doi":"10.1109/ICCCT53315.2021.9711840","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711840","url":null,"abstract":"Diabetes Mellitus, commonly known as Diabetes, is a caused due to high range of sugar in the human body. After a period of time diabetes will lead to a deficiency in eye called as Diabetes Retinopathy. The major symptoms of this disorder are bulging of blood vessels, small lesions and other eye related eyes. The idea of our project is to analyze the severity level of the diabetes retinopathy using three different training methods. Deep learning plays a major role in the project. Proposed Model has been trained with three types, back propagation NN, deep neural networks called DNN and convolutional neural network known as CNN. The Deep Learning models created by using the above neural networks are able to measure the features such as micro aneurysms, blood vessels, fluid drip into different class of categories and hemorrhages. Model will find out the value or level of infection in the patient's eye. Fuzzy C- means algorithm are particularly used to calculate severity of the infection caused and the type of infection also. By this paper, severity of the Retinopathy can be found. The entire system has a user-friendly environment which makes the identification easy. Once the test image is uploaded, the interface will have buttons in order to do the necessary transformation on the given image. At the end of the complete interface options, the level of the infection along with the narrowed down area of infection will be seen in the interface.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Online Examination System on Azure Cloud with Load Balancer Azure云上的安全在线考试系统
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711889
T. Sheela, V. Akila, B. Sravya, T. Harshitha
{"title":"Secure Online Examination System on Azure Cloud with Load Balancer","authors":"T. Sheela, V. Akila, B. Sravya, T. Harshitha","doi":"10.1109/ICCCT53315.2021.9711889","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711889","url":null,"abstract":"There are certain disadvantages of traditional web hosting. It is more expensive as in some cases the setup costs exceed $100. Also, while using standard shared hosting, there's a chance that the site may be taken down if another website on the server becomes infected with a virus or malware. Scalability is not that efficient. To solve these problems cloud hosting is the only solution. Hosting the applications on cloud has become widely popular these days. But with increased access to internet and being online, a large section of people need to work with the same application atthe same time. With many requests from end users, most of the times servers crash and create inconvenience to the users. Also, there is no security for the applications on shared cloud. The aim of our project is to resolve the problem of server crashing and ensuring proper security to the application hosted on the public cloud. This has been ensured by the creation of two virtualmachines which act as servers and the configuration of the load-balancer which reduces the load on these servers by diverting the requests equally to both of them after checking their health. Also, the load-balancer acts as a reverse proxy and hides the backend servers IP address from external hackers thus ensuring security.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114470987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Infection Prevention and Control Using Self Sterlizing Door Handle for Covid 自消毒门把手防控新冠病毒感染
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711780
S. Nagaraj, K. Srividya, S. Premalatha, Santhosh, Sabareeswaran
{"title":"Infection Prevention and Control Using Self Sterlizing Door Handle for Covid","authors":"S. Nagaraj, K. Srividya, S. Premalatha, Santhosh, Sabareeswaran","doi":"10.1109/ICCCT53315.2021.9711780","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711780","url":null,"abstract":"Quality health care is mainly influenced by Infection Prevention and Control (IPC). Healthcare facilities and general public during this covid crisis is very much in need of IPC procedures. Due to this emerging covid crisis the IPC has implemented several measures to stop the spread of pathogens and other transmissible diseases. This paper is precisely focused on the goal of maintaining a safe and healthier environment. Many solutions has been proposed during the covid crisis but it is proven that UV-C light rays has an notable effect on sterilizing the infected areas and it avoids the spread of pathogens, other than tedious methods, UV-C lights on door handles is and effective method in which they are activated when it is in a rest position and disinfects the handle by, killing pathogens. Among the UV spectrum, UVC lights are used in those handles to prevent infections which is the most effective of all the categories of UV light. As the hand to UV rays contact is very less, exposure while touching the handle, its effects on the skin is almost down to zero, non-existent. This device is highly efficient and can be used to reduce the contact ratio with the pathogens.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121872172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoT Based Intelligent Screening System for Preventing COVID 19 Spread in Premises 基于物联网的防COVID - 19传播智能筛查系统
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711763
Rachit Thukral, Manasi Mishra
{"title":"An IoT Based Intelligent Screening System for Preventing COVID 19 Spread in Premises","authors":"Rachit Thukral, Manasi Mishra","doi":"10.1109/ICCCT53315.2021.9711763","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711763","url":null,"abstract":"The outbreak of COVID-19 led to huge number of security issues and casualties. In order to effectively prevent the spread of COVID-19, wearing mask and contactless thermal scanning has become mandatory. The conventional methods for visitor screening and temperature measurement have become inappropriate in this situation to avoid any contact. The traditional face recognition techniques are also ineffective as wearing mask hides some parts of the face. This paper presents an Intelligent IoT based screening system capable of contactless thermal scanning, mask detection and masked face recognition. The person not following the Covid-19 guidelines will be denied the access inside the premise. The system uses deep-learning based techniques for masked face recognition by discarding masked region. The data collected has been sent to the cloud using custom protocol stack which is lightweight, reliable and efficient for data communication. Using web application and mobile application, the data corresponding to each user can be monitored remotely using internet. The data collected can be shared to healthcare agencies for further analysis.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129622569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Spam Detection Using Integration of Logistic Regression and PSO Algorithm 基于逻辑回归和粒子群算法的垃圾邮件检测分析
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711903
A. Ponmalar, K. Rajkumar, Hariharan U, V. Kalaiselvi, S. Deeba
{"title":"Analysis of Spam Detection Using Integration of Logistic Regression and PSO Algorithm","authors":"A. Ponmalar, K. Rajkumar, Hariharan U, V. Kalaiselvi, S. Deeba","doi":"10.1109/ICCCT53315.2021.9711903","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711903","url":null,"abstract":"Content-based text classification system can automatically categories the text document into predefined limited classes. But the e-mail document classification is a challenging process in the modern internet environment. The e-mail documents are lightly signified in a great dimensional features space, creating a learning process, and the generalization (abstraction) process is problematic. Spam is unsolicited mail, the bulk of spam mails sent by the spammers who use vast e-mail programs to cover their characteristics and send the spam mails every day with no money. The spam mail directs various effects, including exposing unwanted images, decreasing company productivity, blocking Internet Service Providers' (ISP) networks, etc. Additionally, the spam mail contains an infection, which is gotten ready for some fake movement. Newline PSO is mighty in taking care of multivariable issues, where factors take on genuine qualities that are taken as new lines an independent method to arrange the datasets and contemplate the PSO-based Classifier for Multiclass Data Sets. Spam has become the foundation of decisions utilized by digital crooks to spread vindictive payloads, for example, infections and Trojans. Community-oriented spam recognition methods can manage the enormous scope of electronic communication information subsidized through numerous causes, and special issues needing exposure to electronic communication information. Distance-protecting hash standard arrangements utilized to save the security of electronic communication information while empowering mails orders to detect spam recognition. PSO, a Big Data security safeguarding synergistic spam identification stage based on top of a standard Map Reduce office. Without PSO feature selection, the training accuracy would be less. With the help of the best dataset fit, the classification result will be high.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
FARM-A-CATION: A support for farmers FARM-A-CATION:对农民的支持
2021 4th International Conference on Computing and Communications Technologies (ICCCT) Pub Date : 2021-12-16 DOI: 10.1109/ICCCT53315.2021.9711798
V. Kalaiselvi, A. Ponmalar, D. Rani, H. B., Thaarun G Srivatsav
{"title":"FARM-A-CATION: A support for farmers","authors":"V. Kalaiselvi, A. Ponmalar, D. Rani, H. B., Thaarun G Srivatsav","doi":"10.1109/ICCCT53315.2021.9711798","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711798","url":null,"abstract":"Technology has evolved every sector in this world more useful. Agriculture is the backbone of our country. But nowadays farmers economic is affected drastically in the modern world compared to the older days. The major affecting factor is their employment, so we decide to solve the problem using our system. It is basically the concept of hiring the farmer giving them work and paying per hourly/day charges. We also incorporated the concept of sell/share/hire of land in which farmers can sell their land if they cannot maintain it, sharing concept is the method in which the farmers will get help from outsider money and they will share half of the profit with the co-share person then the hiring part is a farmer can hire a farmland and do agricultural works and then they pay rent for the hired land. We also aim to make the people to experience the farming and can know how farmer is struggling in making the cultivation. This is the ultimate purpose of the system Farm-a-cation: a support for farmer.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128419280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信