D. D. Mary, Nandana. S Nair, Mohana, S. Revathy, L. Gladence, Bernatin T
{"title":"Automatic Feature Extraction from Satellite Imagery for Remote Sensing","authors":"D. D. Mary, Nandana. S Nair, Mohana, S. Revathy, L. Gladence, Bernatin T","doi":"10.1109/ICOEI56765.2023.10125969","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125969","url":null,"abstract":"Feature extraction from satellite images has steadily but progressively grown in recent years. Numerous feature extraction techniques have been created as a result of the increase. The loss of certain features is one of the various obstacles that must be overcome while selecting the best path for feature extraction. This study suggests utilizing a Convolutional Neural Network (CNN) approach to tackle these issues and extract attributes from satellite images supplied by an open source dataset called MLRSNet. Images with labels explaining each image's characteristics are displayed in the output. This makes it simpler to recognize and understand different components in satellite images.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125674953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Augmented Reality based Intelligent Precision Agriculture using Cascade Advancement Technique","authors":"M. Ulagammai, R. N. Moorthy","doi":"10.1109/ICOEI56765.2023.10125750","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125750","url":null,"abstract":"Agriculture is the backbone of developing countries and it is very important to the country's economy. Therefore, automation must be used in agriculture to solve the issues. The proposed system is based on augmented reality intelligent precision agriculture using the smart sensor. It consists of the hardware ESP32 microcontroller, DHT11 sensor, and Load, and the software unity hub in Augmented Reality technology and Blynk application is used. The proposed system uses a deep learning algorithm characterized by 4 process categories 1) sensor interface, 2) wireless transmission, 3) data processing and 4) data monitoring and controlling. Agriculture characteristics are mostly maintained in the IoT platform, and the AR controls the water outlet during irrigation. To improve system performance and reach maximum efficiency, it is helpful for farmers to maintain irrigation properly. This leads to alternatives that may be both effective and practical.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126055142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"APD-based Laser Range-Gating System","authors":"Sohila Kanaparthi, Y. Rao, Kasyap Battula, Sivaditya Kamadi, Ramesh Varma Potti","doi":"10.1109/ICOEI56765.2023.10125929","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125929","url":null,"abstract":"One of the most important things to have in almost every aspect is security. Everyone in this world seeks security in any and every way possible. One of the ways is to also ensure the security for home during the night from all types of intruders. This proposed system is one of the surveillance systems that help in the detection of any intruders that may enter with the help of laser and gating technologies. Using this system, it is possible to detect intruders who are even traveling at high speeds. Here, a laser source is available all the time. When an intruder meets the laser light, immediately the available buzzer is turned on, and it captures the sense of the intruder. When a target meets the laser source, the laser signal is reflected, and an Avalanche Photo Detector detects the reflected signal. A delayed transmitted laser source signal is generated to synchronize the timing pulse. This type of exposure is known as a gate. With the synchronized gated pulse, the output signal is used to capture the target. This entire process will take place in the order of nanoseconds. The system is connected to ON the camera which is utilized for military surveillance purposes.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123425833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilient Detection of Cyber Attacks in Industrial Devices","authors":"Y. A. Meeran, S. Shyry","doi":"10.1109/ICOEI56765.2023.10125932","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125932","url":null,"abstract":"With the advent of smartphones, laptops, and home computers, smart systems are becoming more and more flexible. As the use of internet increases, there will be more cyber threats occurring on most third-party connectivity websites. The powerful technique used to detect the threats present in the IoT applications are discussed in the proposed system. Based on the KAGGLE NIDS(Network Intrusion Detection System)(Intrusion Detection System) dataset, the number of possible attacks is calculated in the proposed architecture. A similar occurrence of intrusion creating a task is detected by the system, triggering the model to prevent the intrusion by notifying the user immediately. The existing attack detection systems have a number of limitations which includes the need of human intervention to detect the attacks encountered, slower detection rate and inaccuracy in detection. An advanced deep learning algorithm is proposed for detecting possible intrusions to overcome these limitations. The proposed design focuses on creating a Novel architecture using Adaptive convolutional neural network for improving the accuracy and significantly raising the detection rate above that of the current approaches there by aiding in the immediate detection of intrusions.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123160778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Swati Patil, Jay Chandrakant Shimpi, A. Tanawade, Pranali Gajanan Chavan, V. Tandulkar
{"title":"Autonomous Object Detection and Counting using Edge Detection and Image Processing Algorithms","authors":"Swati Patil, Jay Chandrakant Shimpi, A. Tanawade, Pranali Gajanan Chavan, V. Tandulkar","doi":"10.1109/ICOEI56765.2023.10125716","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125716","url":null,"abstract":"Machine vision applications are commonly utilised in manufacturing lines as low cost, high precision measuring devices. Output facilities can accomplish high production numbers without mistakes thanks to these solutions that offer contactless control and measurement. A camera may be used to carry out machine vision tasks including product counting., error checking., and dimension measuring. This study makes a recommendation for a vision system application that can do inanimate object item enumeration. The recommended solution uses Otsu thresholding., Hough transformations., edge detection methods., and other image processing algorithms to accomplish automatic counting without taking into account the kind or colour of the product. The system primarily uses one camera. The general idea is to get image with balanced contrast., brightness and appropriate HSV values in it. A picture of the items being captured using camera using android device., and different image processing techniques are then applied to the picture. Further., a real-time machine vision programme was deployed and took photos taken from an actual experimental setup. The practical experiments conducted have shown that the suggested technique yields quick., precise., and trustworthy results based on the comparative study of various detection techniques.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125680061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Deep Learning Based Model for Defect Prediction in Intra-Project Software","authors":"K.Guna sekaran, L. S. P. Annabel","doi":"10.1109/ICOEI56765.2023.10126014","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10126014","url":null,"abstract":"Testing of software ensures the supply of meaningful software and hence prediction of defects in producing high quality software has become an inevitable one. Software defect prediction's main aim is to find out various bugs present in software and focus on testing efforts. Many of existing software defect prediction frameworks are much simple, making it difficult for developers to get detailed reference information. Nowadays, many deep learning models, like the Radial Base Functional Neural Network(RBF) and the Convolutional Neural Network (CNN), are applied to features which are created automatically from deep learning models and abstract syntax trees (AS Ts) to aid in the improved performance of predicting defects. But the results generated using RBF and CNN algorithms are not able to provide much accuracy due to its restricted size of dataset and improper baseline selections. To resolve these state-of-the-art problems, we have constructed a dataset taken from various defect datasets namely the Kamei Dataset, NASA Dataset and the PROMISE Source Code (PSC) dataset. In this research, the dataset is named as Combination Defect Analysis Dataset (CDA). Then, an Enhanced Convolutional Neural Network (ECNN) model is proposed for predicting defects in Intra-Project software (IPDP) and associated results to different models. Experimental results implied that Enhanced CNN(ECNN) model is efficient compared to the other associated models, along with it outclassing the other machine learning models suggested for IPDP.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130981286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Harun Or Rashid, S. M. Shahriyar, F. J. M. Shamrat, Tanzil Mahbub, Zarrin Tasnim, Md Zunayed Ahmed
{"title":"A Convolutional Neural Network Based Classification Approach for Breast Cancer Detection","authors":"Md. Harun Or Rashid, S. M. Shahriyar, F. J. M. Shamrat, Tanzil Mahbub, Zarrin Tasnim, Md Zunayed Ahmed","doi":"10.1109/ICOEI56765.2023.10125783","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125783","url":null,"abstract":"Thousands of women worldwide are diagnosed with breast cancer yearly, which may be fatal if not treated. The diagnosis of the condition may take years, by which time the patient has little choice except to have the affected breast removed. Early diagnosis and treatments are the best ways to stop this disease's spread. In this study, the authors presented a Computer Aided Diagnosis (CAD) system to assist in breast cancer diagnosis. The study uses the Wisconsin breast cancer dataset to classify benign and malignant data. For the classification, three pre-trained Deep learning algorithms: Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), Multilayer Perceptron (MLP), were used. A novel CNN model that exceeds the performance efficiency of three pre-trained models and requires minimal compilation time is proposed. A number of evaluation matrices are used to analyze the models' classification abilities. Upon closer inspection, it has been established that the proposed CNN model outperforms CNN, LSTM, and MLP models with validation accuracy of 97.85%. CNN and LSTM performed with accuracies of 94.12% with the Adagrad optimizer and 93.5% with the Adam optimizer, respectively. Furthermore, MLP performance with 92.44% accuracy using the Adam optimizer. The proposed CNN model achieves the lowest Loss value and compilation time. In addition, the models' recall value, precision, and f1-score are computed to pick out the most effective model for diagnosing breast cancer on numeric data.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection and Prevention System to Analyse and Prevent Malware using Machine Learning","authors":"V. Ebenezer, Rosebel Devassy, G. Kathrine","doi":"10.1109/ICOEI56765.2023.10125999","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125999","url":null,"abstract":"Computer security has become a potential challenge for all of the studies that have been conducted in communication and information technology domain. In order to guarantee a degree of safety that satisfies the needs of contemporary living, several instruments and procedures have been developed Among them, Intrusion Detection and Prevention Systems (IDPS) frequently detects network attacks and vulnerable behaviours that can reduce the system's efficient operation. This study focuses on designing and implementing an IDPS using NIDS and Docker Jail system with the help of KDDCup 1999 Dataset. Dimension reduction is achieved using PCA. The project's classification algorithms are the supervised SVM and KNN algorithms. In order to stop the attack, a HoneyPot, preferably Artillery, is used in conjunction with the Docker jail system, which is based on the FreeBSD and BSD jail system.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129810391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vaibhav Thalanki, R. N. Akshayaa, R. Krithika, R. Jothi
{"title":"Voice-based Image Captioning using Inception-V3 Transfer Learning Model","authors":"Vaibhav Thalanki, R. N. Akshayaa, R. Krithika, R. Jothi","doi":"10.1109/ICOEI56765.2023.10125754","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125754","url":null,"abstract":"This study presents a deep learning model to serve as an image caption generator that generates descriptions or captions of the images in proper natural language sentences, which will then be read aloud by the text to speech translator. With the growing demand for tools like this in various fields such as assisting the visually impaired, self-driving vehicles, and virtual assistants. Hence, the development of such systems has become increasingly important. The proposed system utilizes a combination of Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN) with attention models, specifically by using the Inception V3 model and a variant of RNN called Gated Recurrent Units (GRU).","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Underground Cable Fault Detector with Distance Locator","authors":"Mandaloju Bhavana, Gorantala Shravya, Maddela Poorna Chander, Tanneeru Subba Rao, Matla Rishika","doi":"10.1109/ICOEI56765.2023.10125617","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125617","url":null,"abstract":"A disruption or break in a cable that is buried underground is referred to as an underground cable fault. A few things, including normal wear and tear, damage from digging, moisture, temperature changes, or other external variables, can result in cable problems. The process of tracing and fixing cable problems can be difficult since it calls for particular tools and knowledge. The objective of this research study is to find the underground cable lines faults. Phase and distance are used to analyse how well the suggested model works. The distance and phase of the fault are shown on a 16#2 Liquid crystal display that is connected to the ArdunioMega. The proposed model eventually performs better in terms of time.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"434 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}