S. Gayathri, K. Jeyapiriya, K. Jeyaprakash, K. Lalitha
{"title":"Detection and Identification of Things for Blind People Using Raspberry PI","authors":"S. Gayathri, K. Jeyapiriya, K. Jeyaprakash, K. Lalitha","doi":"10.1109/ICCCT53315.2021.9711820","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711820","url":null,"abstract":"This work assists visually impaired persons with grocery shopping. The robot module (trolley) contains a Raspberry Pi, as well as an RFID reader, a headset, and motors. The person's speech (part where the person wants to go) is used as input, and this information is sent to the Raspberry Pi through Bluetooth. According to the specifications, the Raspberry will send a command to the driver IC, which will then drive the motors in the desired direction. All of the objects in the section will be RFID- tagged. The RFID scanner will detect (read) the tag whenever an item is picked and dropped into the cart. This will be relayed to Raspberry Pi, which will then send audio output (item name and price) to the person via headset. In addition, all things in the trolley are logged in the IOT and printed at the bill section. The Ultra-sonic sensor is also used to detect obstacles for the blind individual to move forward. Disability refers to a person's inability to fulfil their own desires without the help of others. One of an individual's limitations is visual impairment. Several solutions have been proposed to date to improve the quality of life for visually impaired and blind people. Purchasing groceries without the assistance of others is still a difficult task for them. The paper describes a device that helps them become aware of and purchase their products in the supermarket. RFID (radio frequency identification) reading technology is used. Based on the current time conditions, the audio orders will assist them in the grocery store. It uses obstacle detection to allow you to traverse the store without clashing with any 3- dimensional objects. The billing machine has been computerised to improve the food store. As a result, the existing grocery shop queueing system is eliminated. The device's final purpose is to eliminate other shopping aids for visually impaired persons and provide them with a convenient and complicated environment. When this technology is used, it makes purchasing easier for blind people, saves patron time, and increases business sales. And the cost of an IoT product is compared to the cost of a market product.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115321771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J.Aruna Jasmine, S. Srinivasan, M. Godson, T. Rani, S. Sakthy
{"title":"Share Market Prediction Using Long Short Term Memory and Artificial Neural Network","authors":"J.Aruna Jasmine, S. Srinivasan, M. Godson, T. Rani, S. Sakthy","doi":"10.1109/ICCCT53315.2021.9711849","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711849","url":null,"abstract":"This paper explains prediction of share market trends of organizations using Artificial Neural Network (ANN). The Long Short Term Memory (LSTM) incorporated with a simple neural network gives the result of the movement of company's stock prices in the share market. LSTM is used for processing the time-series data. LSTM is a type of Recurrent Neural Network (RNN). In this work, layers of LSTM networks called stacked LSTM is a core component that process the huge volume of time series data. LSTM model works like a human brain because of the power to have a short term and long term memory. During data processing in the training stage, the model keeps a short term memory of the relation between the date and stock prices which is available in the data. It then starts keeping track of the relations from the successive dates and stock prices since the inception of the company. In this stage, the model tries to find a pattern or a trend in the stock price movement. This is kept in the long term memory. As the model processes further data, it finds an accurate pattern in the stock price movement. The exact date or a number of days is given as input and the stock price is given as output from the model","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125045325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Transfer between Cloud Document Management Systems in Serverless Paradigm","authors":"Ritika Bhole, Sanket Dalvi, Manas Acharya, Sahil Nirkhe, Pradnya B. Rane, Sheetal Jain","doi":"10.1109/ICCCT53315.2021.9711817","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711817","url":null,"abstract":"Data and communication are at the heart of business and interactions. With the onset of economic and reliable Document Management System (DMS) providers, there has been a large-scale migration to these cloud-based services. When it comes to Data Transfer we find ourselves in the realm of mailing files, link sharing, FTP and the list goes on, however, all of these methods involve some level of local computing and storage resource consumption and do not support transfers across different DMS providers. This paper proposes a system that aims to facilitate cloud-agnostic data transfers built over a cloud system with Serverless computing paradigm.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125354125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Kamala, K. S. Mahanaga Pooja, S. Varsha, K. Sivapriya
{"title":"ML Based Approach to Detect Autism Spectrum Disorder (ASD)","authors":"B. Kamala, K. S. Mahanaga Pooja, S. Varsha, K. Sivapriya","doi":"10.1109/ICCCT53315.2021.9711826","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711826","url":null,"abstract":"Autism Spectrum Disorder is an exponential disorder which causes notable challenges in community interaction and behavior for the people affected. Autism children may have trouble in interacting with others and learning the meaning of words for them is really difficult. Parents observe strange behaviors from autism children like lack of coordination and repetition of physical movements such as rotating, waving their hands in a rapid motion, violent shaking of head and body. Autism Spectrum Disorder (ASD) cannot be cured but makes a huge difference in the lives of many children if early treatment is given. And so, ASD is termed as lifelong disorder. Based on the complexity of the disorder, symptoms and severity, the cause for ASD differs. Genetics and environment play a major role. Children having fragile X syndrome and other genetic diseases or children of older parents or exposure to environmental toxins tend to develop autism. In China, 1 out 9000 kids and in India, 23 out of 10000 kids are affected. Early detection is required to improve better treatment methodology and enhance the quality of life of ASD suffering people. Unfortunately, there is no special test to detect Autism. Autism disorder is usually detected by observing the behavioural activities of the children. This method of diagnosis is time consuming and not suitable for early detection. This paper primarily focuses on using ML model to diagnose Autism at an early stage. ML models are usually working with the relationship among various brain regions and hence are preferred over other methods. Moreover, machine learning algorithms are characterized with more prediction accuracy over other models. So, ML which is a subfield of Artificial Intelligence, can be used to enhance the detection methods of Autism by exploring its genetics and designing effective interventions.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"92 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120913378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Subha, T. R. Sree Sahithya, S. Smriti, A.Sasi Kumar
{"title":"Design and development of computational algorithm for real time synchronisation of diesel generator with solar power plant","authors":"S. Subha, T. R. Sree Sahithya, S. Smriti, A.Sasi Kumar","doi":"10.1109/ICCCT53315.2021.9711857","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711857","url":null,"abstract":"Diesel Generator (DG) sets are used in industries as backup power sources which will automatically start up when grid supply is lost. In order to reduce fuel consumption, DG sets are synchronized with solar power plants dually monitoring the load requirements in industries so that DG sets will work under the optimum condition of 30% load when excess solar power is available. There will be no problem when the load is higher than the solar power supply, solar power is fully consumed and the remaining power required for load is taken from DG. But, if the load is lesser than to the solar power supply after the load is fed using solar power, the remaining power left in solar will reverse back to the DG set which causes tripping and also damages the key components of the generator. To curb this problem, an electronic controller is designed to control the operation of DG and solar plants so that solar power can be used efficiently by using LabVIEW software.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121317217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conventional and Hybrid Encryption Schemes for Security against Attacks in Vehicular Adhoc Network","authors":"Kothai G, P. E","doi":"10.1109/ICCCT53315.2021.9711835","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711835","url":null,"abstract":"Vehicular Adhoc Network (VANET) is an important technology in Intelligent Transportation System (ITS) that furnishes the communication between conveyances and the Road-Side Units (RSU) within the vehicular network. In VANET, protecting the data from several distinct security threats in an untrusted environment is still a contentious issue. These security attacks have higher possibility in disrupting the normal operations within the vehicular network and the communication between the conveyances get compromised by injecting the false data and are vulnerable to various distinct attacks into the network. This paper discusses the security issues and several distinct conventional encryption algorithms that support in preventing the various attacks during the transmission of data in the vehicular network. This paper also compares the traditional encryption mechanisms with the hybrid encryption scheme in terms of security and performance.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116335258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kavi Varun Sathyamurthy, A.R. Shri Rajmohan, A. Ram Tejaswar, K. V, G. Manimala
{"title":"Realtime Face Mask Detection Using TINY-YOLO V4","authors":"Kavi Varun Sathyamurthy, A.R. Shri Rajmohan, A. Ram Tejaswar, K. V, G. Manimala","doi":"10.1109/ICCCT53315.2021.9711838","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711838","url":null,"abstract":"In the time of the Covid-19 pandemic there is a need to maintain social distancing and prioritize personal hygiene by the use of face masks and proper sanitary precautions. This although is hard to be monitored and controlled accurately and efficiently, can be done through the use of object detection using convolutional neural networks. This can be done in a way using Tiny-YOLOv4 which is an object detection algorithm that provides lightning-fast detection for many classes of objects without the use of such hardware resources. This project aims to train and test a custom data set using this algorithm to create a highly efficient and accurate face mask detection system that can be easily customized to add additional features such as warning systems, etc. It aims to be a system that can prove to be useful once the pandemic is over as it provides crucial data for the prevention and control of any other possible pandemics that may occur in the future.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122756305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Prashanth, M. Mohamed, K. Latha, S. Hemavathi, D. Venkatesh
{"title":"Enhanced Hybrid Encryption Through Slicing and Merging of Data With Randomization Of Algorithms","authors":"C. Prashanth, M. Mohamed, K. Latha, S. Hemavathi, D. Venkatesh","doi":"10.1109/ICCCT53315.2021.9711883","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711883","url":null,"abstract":"nowadays, data stored in mobile phones become often vulnerable that it is stolen by hackers. More than 50% of mobile users do not encrypt their mobile phones which might result in stealing data when mobile is hacked or stolen. Android encryption is used in android mobiles. The encryption algorithm used is 128 Advanced Encryption Standard (AES) with cipher-block chaining (CBC) and SHA256.In this paper, the data in mobile is encrypted using multiple algorithms(AES, Salsa20, fernet). This method is called hybrid encryption. The data is split and encrypted with multiple algorithms. The selected file to be encrypted is divided into three segments and encrypted with AES, Salsa20, and Fernet algorithms. Then the private keys are encrypted with the RSA (Rivest-Shamir-Adleman) algorithm. The RSA cipher file is stored in phone storage. For decryption, the RSA cipher file is obtained and the responding keys are obtained. With the keys, the AES, Salsa20, Fernet algorithms decrypt the responding encrypted segments. The decrypted segments are combined and the original file is obtained. Then the file is stored in the device.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126814989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Priyadharshini, S. J. Srinithi Samyuktha, G. Shamini, S. Jebamani, S. Prathibha, R. Punitha
{"title":"GSM Based Climate and Irrigation Monitoring System","authors":"R. Priyadharshini, S. J. Srinithi Samyuktha, G. Shamini, S. Jebamani, S. Prathibha, R. Punitha","doi":"10.1109/ICCCT53315.2021.9711866","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711866","url":null,"abstract":"Agriculture is the backbone of our country. It plays a vital role in the economy as well as indevelopment. Nowadays, Indian agriculture faces many issues due to increasing effects of globalwarming. Climate and Water for irrigation are the major problems faced by the farmers whencultivating a crop. We come up with a solution to the prevailing issues in order to help farmersand try to minimize their workload. Our main objective is to detect moisture level and humidity in the soil, and temperature in thefield. By this solution, we intend to help farmers as there is scarcity in manpower too.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125479890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Prabavathi, J. Duela, Balika. J. Chelliah, S. Saranya, A. Sheela
{"title":"An Intelligent Stabilized Smart Sewage Treatment Plant (STP)","authors":"R. Prabavathi, J. Duela, Balika. J. Chelliah, S. Saranya, A. Sheela","doi":"10.1109/ICCCT53315.2021.9711758","DOIUrl":"https://doi.org/10.1109/ICCCT53315.2021.9711758","url":null,"abstract":"Economic sustainability is the future of the smart cities. The developing countries are in the urge of evolving smart electricity, health, infrastructure, water treatment plants etc. but researchers are facing challenges in developing a cost-effective and high-performance system. This study represents an effective approach towards the full automation of the STP (Sewage Treatment Plant) by integrating micro- controllers and sensors to a web application to indicate the sewage water levels in the water plant with secured Cloud Firebase. The automated model will work non-stop with high efficiency. It increases throughput of the treatment system with real-time monitoring of vital information (PH level, Water Level, Sludge Level) to produce good results. It also improves quality or increased predictability in quality of outlet water","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}