{"title":"A Study on Predicting Customer Willingness to Order Food Online During Covid-19 Pandemic Using Machine Learning Algorithms","authors":"K. Aditya Sobika, S. Vivek Raj","doi":"10.1109/ICCCT53315.2021.9711904","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711904","url":null,"abstract":"Online food delivery has become the one of the prominent services during COVID-19 pandemic. After facing deceleration in early COVID-19 phase, online food delivery is slowly gaining momentum in India due to relaxations given by the government and support of the consumers. Online food delivery services need an improved understanding of the complexities of customer behavior which have shifted during this health crisis period of COVID-19 pandemic. The Study is undertaken to predict the customer willingness to order food using online services aftermath of COVID-19 pandemic using Machine Learning algorithms. Primary data collection is done through online survey distributed among public. 415 responses were received out of which 369 people prefer to order through online food delivery services. Using different machine learning models, it is inferred that the Affective and instrumental belief, Perceived benefits (variables of health belief model) are the significant predictors of the customers willingness to order food online. Demographic variables like hours utilized in mobile, frequency of ordering during COVID, Convenience of using food delivery application, number of members in family, age, education qualification and occupation are also found to be significant in determining order opinion.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128603079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Macriga, S. Sakthy, R. Niranjan, Shubhadeepa Sahu
{"title":"An Emerging Technology: Integrating IoT with 5G Cellular Network","authors":"G. Macriga, S. Sakthy, R. Niranjan, Shubhadeepa Sahu","doi":"10.1109/ICCCT53315.2021.9711799","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711799","url":null,"abstract":"5G (Fifth generation networks) is known to be an important phase of mobile telecommunications standards that are higher than the current technology. In recent years when 5G cellular network arrived it was expected to support 1000 times more mobile data as compared to the previous generation cellular networks. The 5G a cellular network has become the back of Internet Of things (IoT) with connects fixed and mobile devices etc. The 5G cellular network offers high data rate, reduces end to end latency and it improves coverage. Hence these parameters are considered to be important for the applications that are related to IoT. In this paper different advantages are discussed when an IoT is integrated with 5G which provides additional features which interconnects the whole world without limits. By analyzing this integration more enhancements can be done to the evolving technologies.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129155203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intrusion Detection and Prevention System for DDoS Attacks using a 2-Player Bayesian Game Theoretic Approach","authors":"Logeswari Govindaraj, Bose Sundan, Anitha Thangasamy","doi":"10.1109/ICCCT53315.2021.9711773","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711773","url":null,"abstract":"Distributed Denial-of-Service (DDoS) attacks pose a huge risk to the network and threaten its stability. A game theoretic approach for intrusion detection and prevention is proposed to avoid DDoS attacks in the internet. Game theory provides a control mechanism that automates the intrusion detection and prevention process within a network. In the proposed system, system-subject interaction is modeled as a 2-player Bayesian signaling zero sum game. The game's Nash Equilibrium gives a strategy for the attacker and the system such that neither can increase their payoff by changing their strategy unilaterally. Moreover, the Intent Objective and Strategy (IOS) of the attacker and the system are modeled and quantified using the concept of incentives. In the proposed system, the prevention subsystem consists of three important components namely a game engine, database and a search engine for computing the Nash equilibrium, to store and search the database for providing the optimum defense strategy. The framework proposed is validated via simulations using ns3 network simulator and has acquired over 80% detection rate, 90% prevention rate and 6% false positive alarms.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129172572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. B. Gracia, J. Ponsam, S. Preetha, Jgk Subhiksha
{"title":"Payment fraud detection using machine learning techniques","authors":"S. B. Gracia, J. Ponsam, S. Preetha, Jgk Subhiksha","doi":"10.1109/ICCCT53315.2021.9711887","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711887","url":null,"abstract":"Credit card usage for online transactions has expanded tremendously as a result of the development and quick expansion of E-Commerce, resulting in an explosion in credit card fraud. There are many tools available in online to generate fake credit card numbers. Most fraudsters use an online credit card to generate fake cards to use for gaming platforms and E-Commerce platforms. We can use machine learning techniques like random forest, logistic regression for improve fraud detection in credit cards. The primary goal of this project is to improve current fraud detection processes by better predictingfake accounts.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121600197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Sentiments in Movie Reviews using Supervised Machine Learning Technique","authors":"I. Regina, P. Sengottuvelan","doi":"10.1109/ICCCT53315.2021.9711848","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711848","url":null,"abstract":"Nearly all high-flying branches of machine learning technique is sentiment analysis. A mechanism text summarization process is used determine to decide that document's author's intent. This article proposes to implement and test a system for the automated sentiment analysis of film reviews. In comparison to other studies that foe us solely on sentimental orientation (Positive versus negative), the proposed approach conducts fine-grained research to evaluate both the viewer's sentimental orientation and sentimental intensity against different facets of the film. This article presents an evaluation of the outcome achieved by applying Variational Forest, XGBoost, Linear Regression, Naive Bayes (NB), Maximum Entropy, and Vector Support Machine (SVM). The experimentation shows that by providing lofty dynamic factors to the film, acting, and storyline facets of a film, we achieved the maximum accurateness in the study of the film reviews.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132237050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern Dine-In","authors":"V. Kalaiselvi, D. Rani, H. P, D. P, R. U","doi":"10.1109/ICCCT53315.2021.9711855","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711855","url":null,"abstract":"“Respect for food is a respect for life, for who we are and what we do”. - THOMAS KELLER. The Food is an essential and a very important component in day to day life. We had seen food is being wasted in garbage, so we came up with our idea of an app named “MODERN DINE-IN”. We are creating an android mobile application in which students and staff can order their lunch online in their college canteen. Based on the Pre-orders the lunch will be prepared. Hence there will be time allocation to order the lunch i.e., Today to next day 9 A.M. They will have payment options like pay while receiving the lunch or online payment through e-wallet, etc… After that, a QR code would be generated respective to the order. Our main objective is to reduce the wastage of food by using our Android mobile application. We will declare whether the canteen is full or going to fill up, by using the no. of persons count. When the Canteen is fully occupied the students or the staff can wait till the canteen gets vacant or they can use the buffet system. After scanning the QR code in the canteen by the administrator, the lunch will be distributed by the staffs to the respective students.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"12 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133119601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video Forgery Detection Using Distance-based Features and Deep Convolutional Neural Network","authors":"V. Vinolin, M. Sucharitha","doi":"10.1109/ICCCT53315.2021.9711876","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711876","url":null,"abstract":"Technological advancement of image and video processing tools made the tampering of videos faster and easier, and even a non-professional can make it simpler. Video tampering becomes a serious problem because it promotes fake news in social media and fake videos manifest in the court. Hence, the identification of forgery done in video is a difficult task. This paper introduces video forgery detection through Deep Convolutional Neural Network (DeepCNN). Initially, from the input video, the keyframe extraction is done using discrete cosine transform (DCT) and Euclidean distance. Then, the face objects are detected from the extracted keyframes using the Viola-Jones algorithm. After that, the light coefficients are calculated from the detected face object using 3D shape and texture models. Then, the features of the 3D face are extracted by employing distance measures. Finally, for video forgery detection the input video and the distance-based features are given to the DeepCNN. The devised method achieved maximal accuracy, True Positive Rate (TPR), True Negative Rate (TNR), and Receiver Operating Characteristics (ROC) of 91.02%, 83.64%, 94.89%, and 95.56%, respectively.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115762680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deep Review On Skin Cancer Through Deep Residual Networks","authors":"S. Gomathi, S. Sudhakar","doi":"10.1109/ICCCT53315.2021.9711808","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711808","url":null,"abstract":"Deep Learning based techniques have being used in medical image analysis to improve classification accuracy in the last few years. Deep Learning Designs such as R-CNN, Fast R-CNN, Faster R-CNN and YOLO have been developed for medical image analysis. Currently, many research studies are going to detect early skin cancer using transfer learning based Residual Networks. This Paper discusses the various Residual Network based models to detect skin cancer with their implementation, comparison of classification parameters and the strength and challenges in the existing models.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123394856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Voting System based on BlockChain and using Iris Recognition","authors":"S. P., Padmasree P, S. R","doi":"10.1109/ICCCT53315.2021.9711819","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711819","url":null,"abstract":"The Voting System in India is often corrupted and altered. The idea is to create an unbiased, secure, fast and efficient Voting System. This project is based on the domain of Block Chain wherein the voting database will be highly secure and processed quickly. The Iris Recognition is another aspect of this system which makes the process flawless. The usage of Blockchain based Database to store the data will make the voting information immutable, reliable and can be quickly accessed. The authorized results tracking makes the voting process more secure, quick and efficient since it is semi-automated. The Iris Recognition identifies the unique patterns of Irises using infrared light and generates an encrypted bit pattern which should match at the time of voting, in order to confirm the individual's identity is true. The process of Iris Scanning is backed up with fingerprint recognition exclusively for blind voting candidates since their Iris pattern may not be measured precisely by the Iris Recognition System.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123061575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"To Save Water Using Pervious Concrete and Measure the Underground Water Table Level Using Internet of Things and Cloud Computing","authors":"C. Rekha, R. Jegatha, P. Sharmila, B. R. Jyothi","doi":"10.1109/ICCCT53315.2021.9711783","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711783","url":null,"abstract":"Rain Water Harvesting is expected to play a major role in bringing depleted water levels up. There is a law of nature that conserving water will aggrandize farming in regions where there is a need for water even to survive. The high utilization of water and land for the developmental area has led to the scarcity of water resources since cutting down trees and deforestation, and it has also jeopardized the world's food security. Recent technological developments have led to improvements in rainwater harvesting techniques and to recovery from disastrous natural calamities like floods, heavy rain which will help and guarantee the availability of food for thegrowing population and save lots of life. Thus, from maiden methodologies to penultimate in present also in future. This system is prospective to improve food security, peculiarly in developing countries also to save many lives from great catastrophizes of nature. Thus, here comes the solution that emerges with the technology of the Internet of Things we can monitorthe underground water level and the usage when there is a scarcity of water the underground water is fetched and used when needed. The water is saved with the help of pervious concrete which is a permeable concrete in which it absorbs water in tonnes and saves underground. To avoid the stagnant of water also to save the rainwater. It is directly connected with pipes and tanks underground also the process is similar to rainwater harvesting collecting and used when needed. This methodology is highly suitable in Metropolitan countries to recharge the needs faced due to lack of water. While emphasizing other methods of draining water systems this pervious concrete not only absorbs water, also reduces water pollution through direct intake offreshwater since it has pervious layers to filter and makes the water ease to use. It is then collected and stored in the tank fill underground, further even treated and used for drinking purposes too. Thus the collected information is stored in the cloud with the help of cloud computing can be retrieved when there is a need to know the statistical increase in the underground water table.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121600248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}