{"title":"A Novel Deep Learning-based Approach for Covid-19 Infection Identification in Chest X-ray Image using Improved Image Segmentation Technique","authors":"Gouri Shankar Chakraborty, Salil Batra, Makul Mahajan","doi":"10.1109/ICOEI56765.2023.10125745","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125745","url":null,"abstract":"Covid-19 diagnosis systems are being improved with the emerging development of deep learning techniques. Covid-19 is widely known for the deadly effects and its high transmission rate. To overcome the challenges, different deep learning-based detection methods have been introduced through which the disease can easily be identified in patient's body. But only identification of the disease is not sufficient to assist physicians for further diagnosis. Infection identification process with severity measurement from medical image can put an advancement in current Covid-19 diagnosis systems. This work presents a novel infection detection approach based on image segmentation technique that can be used to localize the infection. The proposed system is able to predict segmented lung and mask images with visual representation so that it makes the diagnosis task easier for the physicians. ResNet-U-N et, VGG16-U-Net and a modified U-Net model have been implemented in the proposed work where the modified U-Net performed better with 0.968 IoU, 98.60% accuracy and 0.9567 of dice coefficient. An advanced module using OpenCV has been designed that can calculate the area of the predicted lung and infection mask images separately and then the infection percentage can be calculated accurately.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129410676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. R. Ramkumar, Taniya Hasija, Bhupendra Singh, Amanpreet Kaur, S. Mittal
{"title":"Key Generation using Curve Fitting for Polynomial based Cryptography","authors":"K. R. Ramkumar, Taniya Hasija, Bhupendra Singh, Amanpreet Kaur, S. Mittal","doi":"10.1109/ICOEI56765.2023.10125901","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125901","url":null,"abstract":"Every organization's primary concern is security. A cryptography method will remain safe in the system if the key is not cracked by a hacker through any kind of attacks. A conventional cryptography algorithm's strength relies on the key size and structure. Cryptography algorithms can be susceptible to brute force attacks since their keys have fixed lengths. The advantage of having a variable length key is leveraged to mitigate key-Size based attacks by using polynomials. This article outlines an algorithm for generating and maintaining the keys based on the polynomials and interpolation.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131337440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kapil Kant Kamal, Padmaja Joshi, A. Bang, Kavita Bhatia
{"title":"Effective Security Testing of Mobile Applications for Building Trust in the Digital World","authors":"Kapil Kant Kamal, Padmaja Joshi, A. Bang, Kavita Bhatia","doi":"10.1109/ICOEI56765.2023.10125814","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125814","url":null,"abstract":"In recent years, mobile applications have become increasingly important. These applications differ significantly from desktop and web applications, and being used increasingly in various enterprise domains. Accordingly, this motivates the mobile industries to increase the accessibility of mobile applications and their development across many platforms, including Android and iPhone. This research work discusses the security testing procedure and features of India's first indigenous AppStore “mSeva AppStore”. To ensure the quality of the hosted mobile applications, distinct techniques, and effective testing approaches are required. Before hosting the application on mSeva AppStore regressive testing is performed in all aspects like insecure permissions, data storage, secure logic, proper platform algorithms, etc. However, in the current mobile application testing scenario, other AppStore does not consider all factors before hosting the applications, which is quite necessary. This study highlights the key terminologies of mobile application testing and quality parameters. Further, demonstrates the actual results that are obtained during the security testing of various applications. Along with this, the first-ever Common Weakness Enumeration (CWE) based classification regarding common artifacts in mobile application testing is provided. The peculiarities discussed with respect to mobile applications and the testing requirements in the context of secure hosting will help the relevant researcher and stakeholders in this field.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Pandey, M. Wazid, A. Mishra, N. Mohd., D. P. Singh
{"title":"Need of Cyber Security, Tools, Uses and Future Research","authors":"P. Pandey, M. Wazid, A. Mishra, N. Mohd., D. P. Singh","doi":"10.1109/ICOEI56765.2023.10125792","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125792","url":null,"abstract":"Cyber security is used to safeguard computer systems, networks and other digital devices from the damage. Hackers always try to use advance tool to obfuscate their detection and launch a new cyber attack. Therefore, some advance cyber security tools to check the security of the systems are required. In this paper, the details of some of potential cyber security tools and their uses are provided. The information about their functionalities, licensing and online links are given. Moreover, the need of cyber security is explained. Finally, some of the potential research directions related to cyber security are provided.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Masram, Aakansha Nimje, Arpita Raut, Neha Mehatre, Sayli Humane
{"title":"IoT based Overload Detection System in Public Transportation Vehicles","authors":"B. Masram, Aakansha Nimje, Arpita Raut, Neha Mehatre, Sayli Humane","doi":"10.1109/ICOEI56765.2023.10125693","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125693","url":null,"abstract":"In India, due to the negligence of the legal systems, transporters loaded the goods vehicles with weights far above the permissible limit. Overloaded vehicles cause extensive road damage and enormous economic losses to society, seriously threatening road safety. Due to overloading, many people lose their lives in accidents, and vehicle fuel consumption increases, resulting in environmental pollution. To create a workable, effective system for the Regional Transport Office department and to generate, and manipulate fines. The proposed system has given the count of incoming and departing passengers which has become a feasible, efficient technique in any Regional Transport Office department. The IOT system has used the Node MCU model in proposed system for the efficient work of the system","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127190235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Disease Identification in Tomato Leaves Using Inception V3 Convolutional Neural Networks","authors":"Srinivas Samala, Nakka Bhavith, Raghav Bang, Durshanapally Kondal Rao, C. Prasad, Srikanth Yalabaka","doi":"10.1109/ICOEI56765.2023.10125758","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125758","url":null,"abstract":"Tomatoes are the most widely grown vegetable, used in a wide variety of dishes around the world. After potatoes and sweet potatoes, it is the third most extensively cultivated crop in the world. However, due to several diseases, both the quality and quantity of tomato harvests dedine. To maximize tomato yields, it is important to identify and eradicate the many diseases that harm the crop as early as possible. In this paper, we investigate the potential of deep learning techniques for diagnosing diseases on tomato leaves. The use of automatic methods for tomato leaf disease detection is helpful because it reduces the amount of monitoring needed in large-scale crop farms and does so at a very early stage when the signs of the disease identified on plant leaves are still easy to cure. The Kaggle dataset for tomato leaf disease was used for the study. A technique based on convolutional neural networks is used for disease identification and classification. Deep learning models, such as Inception V3 are used in this work. This proposed system obtained an accuracy of 99.60% suggesting that the neural network approach is effective even under difficult situations.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dual Band Fractal Antenna with Truncated Hexagonal Nested Rings for Wireless Applications","authors":"N. Srikanta, M. Pachiyaannan","doi":"10.1109/ICOEI56765.2023.10125628","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125628","url":null,"abstract":"This article presents and analyses a low profile truncated hexagonal nested rings patch antenna for use in various wireless applications. This dual band antenna is fed by a 50 ohm microstrip feed line and is made of truncated nested hexagonal rings-shaped radiating patch elements on a single layer 1.6 mm thick FR4 substrate. To achieve adequate impedance matching between the antenna and the source, the truncated patch with partial ground plane is used. While the S11value is less than −10 dB, the designed antenna functions at two different frequency bands, including 4.6-6.7 GHz, and 12 GHz to 14.2 GHz. In order to test the antenna operation at the two distinct frequency bands and optimise the design, the Ansoft High Frequency Structure Simulator (HFSS) is used. At two frequency bands, the developed antenna shows greater gain. To verify its performance, the dual band antenna underwent testing and prototype development. The simulation outcomes demonstrate a fair level of agreement with the measurement outcomes.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117353412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sohaib, V. Aarthi, M. N. Laxmi, G. G. Shivaji, T. A. Kumar, M. Ramesh
{"title":"IoT-based Web Application for Passenger Travel Tracking System","authors":"M. Sohaib, V. Aarthi, M. N. Laxmi, G. G. Shivaji, T. A. Kumar, M. Ramesh","doi":"10.1109/ICOEI56765.2023.10125610","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125610","url":null,"abstract":"In this work, RFID (Radio Frequency Identification Device) labels are used to create electronic transportation tickets for the public transportation system. Transport systems with cutting-edge innovations like RFID, IoT, and GPS will eventually gain popularity due to their advantages of greater comfort and higher ethical standards as compared to traditional transport systems or paper ticketing systems. In the proposed approach, the passenger is automatically identified by using their RFID card, and the fare according to the distance travelled by the passenger is automatically subtracted from the RFID card. GPS and RFID tags are used to increase the precision of fare calculation and passenger identification. The RFID system can replace conventional paper-based tickets since they are better because they are reusable and offer improved accuracy. This eliminates the outdated paper-based bus booking system and guards against money laundering and corruption. RFID tags are used as reusable tickets that calculate the fee based on the user's GPS-measured distance travelled. By using this system, human errors and effort are reduced.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Riya Kedia, B. Kumar, Pallab Banerjee, Pooja Jha, Tannisha Kundu, Mohan Kumar Dehury
{"title":"Analysis and Implementation of Image Steganography by Using AES Algorithm","authors":"Riya Kedia, B. Kumar, Pallab Banerjee, Pooja Jha, Tannisha Kundu, Mohan Kumar Dehury","doi":"10.1109/ICOEI56765.2023.10125790","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125790","url":null,"abstract":"Popular cryptographic technology called Advanced Encryption Standard (AES) enables secure data transfer over the internet. It is used for a variety of purposes, such as secure data transfer, mobile phone encryption, and encryption of extremely sensitive data. It operates in terms of blocks, or chunks, of data. Steganography is the process of hiding data in another sort of data, such as a digital image. If a user wants to utilize a cryptographic method to conceal encrypted data in an image, such as AES, it is essential that the method be impervious to all possible attacks. This study has analyzed the possibility to hide data inside digital photos by utilizing encryption techniques like AES. The performance comparison of AES and Data Encryption Standard (DES), a full Python implementation of the AES for image steganography is also presented. To illustrate how each method performs, experimental results are provided. The Advanced Encryption Standard can be programmed in software or built with pure hardware.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131214553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Manikandan, K. K. Babu, G. M. Reddy, G. Kalayan, V. Muneeswaran
{"title":"KARE - Presto Canteen Management System with an Android Application","authors":"P. Manikandan, K. K. Babu, G. M. Reddy, G. Kalayan, V. Muneeswaran","doi":"10.1109/ICOEI56765.2023.10125634","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125634","url":null,"abstract":"In the midst of a technological revolution that is set to drastically alter human daily lives and may even redefine the concept of humanity. One area where technology is being implemented is in canteen management systems, which offer a convenient way for university students and staff to order food without having to physically go to the cafeteria and wait in long queues. This research work proposes a canteen management system that utilizes an ARM processor, Bluetooth module, thermal printer, Liquid Crystal Display (LCD), and an Android application. The Android app dis plays the food menu with prices and ratings, allowing users to remotely order their food from within the canteen. This saves time for students and staff, who no longer must stand in line for extended periods. The canteen cashier can see the orders and print the bill once the user has paid. This system is designed to streamline the food ordering process and reduce wait times. Many universities do not have a food order collection system, forcing students to go directly to the counter and place an order, which is a time-consuming process. This system aims to solve this problem and provide a more efficient way for students and staff to order food.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131646829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}