Kantipudi Pranathi, Bodepudi Lakshmi Priya, A. Y. Felix
{"title":"Utilizing Machine Learning Models to Determine the Security Level of Different Cryptosystems","authors":"Kantipudi Pranathi, Bodepudi Lakshmi Priya, A. Y. Felix","doi":"10.1109/ICOEI56765.2023.10125757","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125757","url":null,"abstract":"Due to recent developments in multimedia technology, digital data security has emerged as an important concern. To improve upon the state of the art in terms of security, researchers often recommend modifications to procedures that have previously been implemented. However, many suggested encryption algorithms have proved unsafe over the previous several decades, putting sensitive data at risk. It is crucial to use the most suitable encryption strategy to defend against such attacks; nevertheless, the type of data being protected might affect the method that is most appropriate for each given situation. However, systematically evaluating various cryptosystems to choose the optimal one may consume significant computational effort. To rapidly and reliably choose the appropriate algorithm, an SVM (support vector machine) is proposed as a security-level identification tool for photo encryption algorithms. In this research, a dataset was compiled with the help of common encryption security criteria, including Security, Peak signal to noise ratio, Homogeneity, Correlation, Contrast, Energy, Entropy, and Mean Square Error. These values are used as extracted characteristics from various cypher pictures. There are three tiers of security for dataset labels: strong, acceptable, and weak. For evaluating the effectiveness of the proposed model, the calculated accuracy and results demonstrate the value of this SVM system.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128240823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Krishnamoorthi, Karthi P Sri Ram, M. Sathyan, T. Vasanth
{"title":"Improving Optical Character Recognition(OCR) Accuracy using Multi-Layer Perceptron(MLP)","authors":"M. Krishnamoorthi, Karthi P Sri Ram, M. Sathyan, T. Vasanth","doi":"10.1109/ICOEI56765.2023.10125603","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125603","url":null,"abstract":"Optical Character Recognition (OCR) is a cutting-edge application that has been made possible due to advances in technology. Optical Character Recognition involves using deep learning algorithms such as Multi-Layer Perceptron and Support Vector Machine to create a system that can recognize characters in an image. The Optical Character Recognition system first segments each character individually as part of the pre-processing step, after which it post-processes the image to compare each character to the pre-processed data. In the modern world, Optical Character Recognition is a crucial technology used in many industries to shorten turnaround times while increasing accuracy. However, one of the challenges faced with Optical Character Recognition is that it takes longer to match exact results and produces results with lower precision and character misreadings. To address this challenge, the pre-processed data used by Optical Character Recognition systems now includes practically all fonts. This means that the Optical Character Recognition system has to match the characters with a much larger dataset, making the process more time-consuming and less accurate. To improve the accuracy and speed of Optical Character Recognition systems, several methods have been employed. For instance, post-processing techniques such as error correction algorithms can be used to detect and correct errors in the Optical Character Recognition output. Additionally, the use of deep learning techniques such as Conventional Neural Networks has been shown to improve the accuracy of Optical Character Recognition systems. By employing these methods, Optical Character Recognition can become an even more powerful tool that can shorten turnaround times while increasing accuracy.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130430291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pedestrian and Object Detection using Image Processing by YOLOv3 and YOLOv2","authors":"Amar Lokesh Venkata Siva Sai Chatrasi, Anush Gupta Batchu, Leela Satya Kommareddy, Jyotsna Garikipati","doi":"10.1109/ICOEI56765.2023.10125788","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125788","url":null,"abstract":"Detecting instances of semantic objects of a specific class, such humans and other things, in digital photos and videos is the goal of object detection, a branch of computer vision and image processing. It is frequently used for activities including picture annotation, vehicle counting, and object tracking, such as tracing a ball during a football game, a cricket bat's movement, or primarily a person in a movie. In this study OpenCV is used with YOLOv3 neural network to detect pedestrians and objects from an input video or a real time webcam. In order to determine how accurately the pedestrians and objects are recognized using the You Only Look Once (YOLO) algorithm, a box is produced along its boundaries with its name and Intersection Over Union (IOU) value, which is determined using the formula area of Intersection/Area of Union. The pre-trained model and the weights of the COCO dataset of YOLOv3 tiny algorithm are used for the detection and compared with YOLOv2 algorithm.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130483223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kalyango, Emma E.Y Wilson, J. Nakatumba-Nabende, Ggaliwango Marvin
{"title":"Interpretable Machine Learning Regressors for Mild Hypothermia Prediction in General Surgical Operations","authors":"M. Kalyango, Emma E.Y Wilson, J. Nakatumba-Nabende, Ggaliwango Marvin","doi":"10.1109/ICOEI56765.2023.10125880","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125880","url":null,"abstract":"Hypothermia is a medical emergency that occurs when there is a low body temperature from the normal body temperature of 35oC. The occurrence of this emergency reportedly ranges from 33% to 89% during general surgical operations and often leads to extremely short and long-term complications. Fortunately, there has been a growing trend in using electronics and informatics for smart healthcare, particularly in using artificial intelligence (AI) and machine learning (ML) as innovative applications for predicting medical emergencies. In this paper, the use of Interpretable Machine Learning Regressors for Mild Hypothermia Prediction in General Surgical Operations was leveraged. Specifically, building, testing, and optimization of Extreme Learning Machine (ELM), Linear, Random Forest (RF), Logistic, and Support Vector Machine regression models were done where an accuracy of 98.76%, 98.79%, 98.69%, 73.28%, and 29.34% respectively was obtained upon model tuning and hyperparameter optimization. SHapely Additive exPlanations (SHAP) and Local Interpretable Model-Agnostic Explanations (LIME) based on physiological vitals were transparently provided. This work can contribute to Society 5.0 by improving patient outcomes of general surgical operations, reducing healthcare costs, and increasing the efficiency and effectiveness of Intelligent Healthcare Systems.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1992 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131354887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subiramaniyan S D, Mohamed Fayas M P, Selva Bharathi S M, Sasikala K, R. Reshma, S. Sasirekha
{"title":"A Novel Decentralized Product Verification using Blockchain Technology","authors":"Subiramaniyan S D, Mohamed Fayas M P, Selva Bharathi S M, Sasikala K, R. Reshma, S. Sasirekha","doi":"10.1109/ICOEI56765.2023.10125833","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125833","url":null,"abstract":"A blockchain is a distributed database that serves as a public ledger of all digital events and transactions executed and shared among participating parties. Consensus from a majority of system participants verifies each transaction in the public ledger, and once recorded, the information cannot be erased. The blockchain contains a verifiable record of every transaction ever made, making it similar to a cookie jar in a crowded marketplace compared to a secluded location. The product verification system utilizes the Ethereum blockchain to deploy smart contracts in blocks. There are two users: manufacturers and customers. Manufacturers can save product information, including product price, name, manufacturing date, location, and expiry date, in the blockchain as a smart contract. This information can be saved in QR codes and NFC tags that act as digital invoices for the product. Customers can confirm product details by scanning the QR code or NFC tag. Smart contracts are built using Solidity, and the deployment is completed using the Truffle blockchain deployment tool. Firebase handles authentication capabilities, allowing analytics on the number of authenticated customers.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131651427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things (IoT) based Smart Helmet and Intelligent Bike System","authors":"Kunal Kalkotwar, Manthan Ukey, Sanket Nanwatkar, Shreyas Gulwade, Yash Padole, Pranjali M. Jumle","doi":"10.1109/ICOEI56765.2023.10125884","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125884","url":null,"abstract":"Nowadays, there are many bicycle accidents around us. People get hurt and die, and one reason is that he doesn't wear a helmet. Wearing a helmet during an accident could have saved many lives. Road traffic regulations are constantly violated. To overcome these problems, smart helmets with control systems embedded in the helmet have been proposed. The smart motorcycle helmet is a project to improve motorcyclists' safety on the road. The idea was born out of a recognition that the number of motorcycle accidents has been increasing for years and is a cause for concern. It consists of HF transmitter and HF receiver system. The bike will not start if the user is not wearing a helmet. This is because when the user puts on the helmet, the transmitter emits an RF signal that is detected by the motorcycle's ignition switch receiver, the bike starts. The security system applied in this project matches the characteristics of an ideal driver, so the focus should be on the application. The project aims to improve safety and reduce accidents, especially motorcycle fatalities. This project showcases a smart his helmet that prevents a rider from starting a bike without wearing it. This helmet wirelessly powers your bike using a simple cable swap, so your bike won't start without your keys and your helmet. Additionally, an alcohol sensor measures the alcohol he level in the rider's breath every time the rider catches fire and automatically stops the bike if the rider is intoxicated.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akshay Mahale, Amol S Deshmukh, Rahul Mahajan, Arun Vidyadharan, Vijeth S Hegde, Koushik Vijayaraghavan
{"title":"Data Validation using Sentence Transformers","authors":"Akshay Mahale, Amol S Deshmukh, Rahul Mahajan, Arun Vidyadharan, Vijeth S Hegde, Koushik Vijayaraghavan","doi":"10.1109/ICOEI56765.2023.10125780","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125780","url":null,"abstract":"Focusing on the various data quality factors and fulfilling the accuracy requirements is an important step in the implementation of businesses that use data in their decision-making process. The use of inaccurate data by companies can lead to insignificant decisions and judgments that result in higher costs and time consumption. This study talks about how to validate the migrated data by comparing the source and target data in an automated way. The proposed research describes the solution and explain how Artificial Intelligence/ Machine Learning (AI/ML) techniques are implemented using the Sentence Transformer approach to accelerate the data validation process.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121444622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Quasim, Mohammad Mufareh Mobarak, Khairuddin Nisa, Mohammad Meraj, Mohammad Zunnun Khan
{"title":"Blockchain-based Secure Health Records in the Healthcare Industry","authors":"M. Quasim, Mohammad Mufareh Mobarak, Khairuddin Nisa, Mohammad Meraj, Mohammad Zunnun Khan","doi":"10.1109/ICOEI56765.2023.10125802","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125802","url":null,"abstract":"Global healthcare systems are going through substantial changes in access, data processing, monitoring, and healthcare. By 2020, it's anticipated that connected and data-capturing equipment will have produced around 2314 exabytes of healthcare data. Cybercriminals work very hard to get access to medical information. Due to this challenge, the market for cybersecurity is predicted to reach $27.1 billion in 2026. To collect data for clinical research, a central repository will be formed with blockchain technology. This article proposes a secure mechanism utilizing Blockchain to guarantee the security of electronic health records (EHR). Databases, the Internet of Things, sensors, and other computing resources are part of the architecture. In comparison to the conventional healthcare system, the security and privacy of EHR will be improved by this framework for security","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"7 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114111649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Industry 5.0 for Healthcare 5.0: Opportunities, Challenges and Future Research Possibilities","authors":"L. Gomathi, A. K. Mishra, A. Tyagi","doi":"10.1109/ICOEI56765.2023.10125660","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125660","url":null,"abstract":"Industry 5.0 is the subsequent stage in the development of manufacturing and production systems that combines cutting-edge technology with human intelligence and skills. The healthcare sector has been developing over time, going through significant changes at every stage. The emerging idea of Industry 5.0 in the healthcare sector, also known as Healthcare 5.0-and its potential applications in the healthcare sector are examined in this study. Healthcare 5.0 makes use of cutting-edge technologies to revolutionise healthcare delivery, improve patient outcomes, and improve the healthcare experience as a whole. Industry 5.0 places a strong emphasis on the integration of humans, machines, and technology in the manufacturing industry. The study discusses Healthcare 5.0's potentials and opportunities, including personalised medicine, sophisticated diagnostics, telemedicine, and more patient-centric care, all of which are made possible by the application of cutting-edge technologies like Artificial Intelligence (AI), blockchain, big data analytics, and robotics. The study also discusses the difficulties and problems that must be solved for Healthcare 5.0 to be implemented successfully, including data security and privacy, ethical and legal issues, the need for appropriate skills and training for healthcare professionals, and cost-effectiveness.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116140050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Palanikkumar, G. Arun, R. Arunadevi, S. Gayathri, P. Dharun
{"title":"An Enhanced Decentralized Social Network based on Web3 and IPFS using Blockchain","authors":"D. Palanikkumar, G. Arun, R. Arunadevi, S. Gayathri, P. Dharun","doi":"10.1109/ICOEI56765.2023.10125612","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125612","url":null,"abstract":"Human lives now include a significant amount of social media usage. Social media is used to create communities, strengthen bonds, and stay in touch with distant friends. A single server, which performs all significant processing, serves as the hub of a centralized system. Thus, a centralized server becomes an easy target for hackers. Decentralized social networks can provide a more secure environment where users may exercise more privacy control through distribution of information processing across many machines. This study proposes a system where the Web3 Library is used to implement the decentralized network. This provides a social graph with all devices in the network. The Ethers library provides functionalities to engage the Ethereum framework. This way an OSN (Online Social Network) service based on blockchain is created and its decentralized operations are performed. Due to a decentralized autonomous organization that is designed for user autonomy, users can democratically self-manage the OSN.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}