{"title":"Simultaneous localization and mapping with Poisson's surface reconstruction","authors":"I. Gayatri, R. V","doi":"10.1109/C2I456876.2022.10051343","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051343","url":null,"abstract":"In a robotics or automation context, simultaneous localization and mapping are frequently employed. To continue using the system, the operator or user must be aware of the system's location in an unknown environment as well as the map or other features of that environment. Unmanned aerial vehicles are frequently employed in mapping disaster zones, fighting fires, performing maritime rescues, and many other tasks. To keep the operators aware of the present situation, the majority of these call for mapping and localization. Aerial mapping is required in order to collect data and continue operations with UAVs. SLAM can even be used indoors as long as an image can be captured in the environment. Landmarks, digital representation of the area, and the gathering of data are all possible with SLAM. This paper combines visual SLAM and gets the 3D point clouds. With these point clouds, for visualization, Poisson surface reconstruction is used.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121636017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Copyright and Consent Form","authors":"","doi":"10.1109/c2i456876.2022.10051319","DOIUrl":"https://doi.org/10.1109/c2i456876.2022.10051319","url":null,"abstract":"To ensure uniformity of treatment among all contributors, other forms may not be substituted for this form, nor may any wording of the form be changed. This form is intended for original material submitted to the IEEE and must accompany any such material in order to be published by the IEEE. Please read the form carefully and keep a copy for your files.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126221624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Audio to Sign Language conversion using Natural Language Processing","authors":"Nayana J, Suparna Bhat, Rekha R Nair, T. Babu","doi":"10.1109/C2I456876.2022.10051414","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051414","url":null,"abstract":"People who are deaf never get to enjoy things that hearing folks do, whether it's conversation, playing the game, going to seminars, or participating in virtual meetings, for example. The major challenge they have while interacting among regular people is connection, because every regular person has no concept what sign language is or how it works.. Our project's objective is to help those who have hearing loss develop a system for communication. The spoken message is converted into signs. It converts the spoken word into signs. This system receives voice as inputs, converts the soundtrack into a text, and displays the key symbols used in Indian language using well before graphics or GIFs. The use of this technology makes communication between those who have normal hearing and those who are difficult to hear easier This takes into account how your arms, body, and appearance are combined. Around the universe, there really are 135 different varieties of hand signals. There are numerous different sign languages, including American Sign Language (ASL), Indian Sign Language (ISL), British Sign Language (BSL), Australian Sign Language (Auslan), and many more In this initiative, Indian Sign Language is being used. The deaf community may take advantage of all the activities that hearing people engage in, from social engagement to accessing information, thanks to this technology. NLP is used to pre-process the text (Natural Language Processing). With the help of this technology, hearing-impaired people may participate in a wide range of activities, from socialising to accessing information NLP is used to post the text (Natural Language Processing). This programme converts audio into text, displays Indian sign language, and then accepts speech as input. Accuracy rate for the planned project work is 99%, and Validation accuracy is 96%.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"46 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114006272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rashmi Rani Samantaray, Nayana Hegde, Abdul Azeez, Anees Fathima, S. Prasad, J. Surendiran
{"title":"Smart Cart Powered by Artificial Intelligence","authors":"Rashmi Rani Samantaray, Nayana Hegde, Abdul Azeez, Anees Fathima, S. Prasad, J. Surendiran","doi":"10.1109/C2I456876.2022.10051614","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051614","url":null,"abstract":"These days shopping at enormous shopping centers or stores are turning into a day to day action in metro urban communities and non-metro urban areas. We can see enormous number of individuals at shopping centers and grocery stores on siestas and ends of the week. The people groups will be significantly more when there are unique offers and markdown. Individuals buy various things and put them in streetcar. After all out buy one necessities to go to charging counter for installments. At the charging counter the clerk reads the bill utilizing standardized identification per user which is a tedious cycle and results in lengthy lines and remaining of more number of individuals at charging counters. Our primary objective is to foster a framework that can be utilized in shopping centers to settle the previously mentioned difficulties. On other hand, Management division deals with issue in regard to manual examination of past records and it are likewise difficult task to anticipate future prerequisites. This framework will assist with lessening responsibility and manual blunders which emerge in conventional examination process by giving programmed examination and it additionally gives the data on the off chance that a few items get taken by individuals while buying. These outcomes in the best answer for every one of the previously mentioned issues. In this work, we have proposed an idea to detect theft at shopping malls also reduces human involvement. This also makes billing faster and hassle free.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122056998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Manikandakumar, P. Rachana, K. Yashas, D. Teju, V. Vaibhav
{"title":"Elevating Network Experience in LAN","authors":"M. Manikandakumar, P. Rachana, K. Yashas, D. Teju, V. Vaibhav","doi":"10.1109/C2I456876.2022.10051211","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051211","url":null,"abstract":"Networking is the most overlooked domain which contributes to our social well-being. Networking encompasses everything that makes it possible for computer, server, and other devices to communicate, and includes the design, construction and use of network but also the maintenance, management and operation. The state of computer networking has changed and evolved drastically since the early 1980s when it gained popularity. Despite of having multiple networking tools none of them are unified and are made user-friendly. This project helps in enhancing user experience of the users in the network and provides better services and security.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115203347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Copyright and Consent Form","authors":"","doi":"10.1109/c2i456876.2022.10051205","DOIUrl":"https://doi.org/10.1109/c2i456876.2022.10051205","url":null,"abstract":"To ensure uniformity of treatment among all contributors, other forms may not be substituted for this form, nor may any wording of the form be changed. This form is intended for original material submitted to the IEEE and must accompany any such material in order to be published by the IEEE. Please read the form carefully and keep a copy for your files.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128546546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an Optimal Security Using Multifactor Scalable Lightweight Cryptography for IoT","authors":"G. E., S. Sheeja","doi":"10.1109/C2I456876.2022.10051303","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051303","url":null,"abstract":"With the growth of the number in smart devices based on IoT, keeping a secure data processing among them has become even more significant in cloud computing. However, a high security is needed to protect the huge amount of data privacy. In this regard, many authentication approaches are presented in IoT-Cloud-based Architecture. However, computation, latency, and security strength are major issues to provide authentication for users. We propose the Multifactor Scalable Lightweight Cryptography for IoT-Cloud to enhance security to protect the user or organization's information. The non-sensitive and sensitive data are generated from IoT devices and stored in our proposed hybrid public and private cloud after the encryptions. Hence, encryptions for public cloud and private cloud data are done by Digital Signature Algorithm and Policy based Attribute encryption algorithm with Moth fly optimization. This optimization is chosen as the key parameter efficiently. The three multifactors are then used to perform the three levels of authentication by Trust based Authentication Scheme. Following this, the proposed multifactor authentication is simulated and compared with existing approaches to analyze the performance in terms of computational and execution time and security strength. As a result, the proposed method is shown 97% of security strength and minimum computation and execution time than other conventional approaches.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115841792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Binju Saju, V. Asha, Sarath C Murali, V. D, Vikash Kumar, B. Nithya
{"title":"ML based Prototype for Skin Cancer Detection","authors":"Binju Saju, V. Asha, Sarath C Murali, V. D, Vikash Kumar, B. Nithya","doi":"10.1109/C2I456876.2022.10051378","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051378","url":null,"abstract":"Skin malignant growth is one of the most lethal types of disease, and the demise rate has essentially become because of an absence of consciousness of the markers and protection measures. Therefore, in order to stop the spread of cancer, early identification at an early stage is essential. Skin cancer is further classified into several forms, with melanoma, nevus and seborrheic_keratosis. This study utilizes Artificial Intelligence (AI) and picture-handling techniques to recognize and classify various types of skin cancer. Dermoscopic pictures are thought about as contributions during the pre-handling steps. The production of a Convolutional Neural Network based melanoma detection model. If melanoma is not found in its early stages, it can be fatal. It is responsible for 75% of skin cancer fatalities. A system that can analyse photos and notify dermatologists of the existence of melanoma might potentially eliminate the need for a lot of manual diagnosis work. Similar findings to those of the pertained model were produced by our created model. In simulations using the 2017 International Skin Imaging Collaboration skin cancer dataset, the suggested method performed admirably. The Convolutional neural network was able to achieve a 92 % accuracy rate.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115988304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Copyright and Consent Form","authors":"","doi":"10.1109/c2i456876.2022.10051263","DOIUrl":"https://doi.org/10.1109/c2i456876.2022.10051263","url":null,"abstract":"To ensure uniformity of treatment among all contributors, other forms may not be substituted for this form, nor may any wording of the form be changed. This form is intended for original material submitted to the IEEE and must accompany any such material in order to be published by the IEEE. Please read the form carefully and keep a copy for your files.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Copyright and Consent Form","authors":"","doi":"10.1109/c2i456876.2022.10051174","DOIUrl":"https://doi.org/10.1109/c2i456876.2022.10051174","url":null,"abstract":"To ensure uniformity of treatment among all contributors, other forms may not be substituted for this form, nor may any wording of the form be changed. This form is intended for original material submitted to the IEEE and must accompany any such material in order to be published by the IEEE. Please read the form carefully and keep a copy for your files.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125751850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}