{"title":"Cloud Computing Based Face Mask and Helmet Facial Detection for ATM Security Using Image Processing","authors":"B. Veena, S. Babu","doi":"10.1109/ICSSS54381.2022.9782202","DOIUrl":"https://doi.org/10.1109/ICSSS54381.2022.9782202","url":null,"abstract":"In this modern-day scenario the ATM robbery are increasing rapidly thus the security is one of the biggest concerns and this project will focus on improving the security of ATM transactions. The main process of the project would be incorporating cloud and image processing. Image processing will play a crucial role in the current situation where we will need data to be processed for differentiating between people who are wearing mask and not wearing mask. Though every people have to wear mask as a safety precautions, some people misuse it for illegal things. The project's current focus is only on ATM transactions. In this project the process of ATM transaction will be finetuned so that a person can't proceed in the transaction without removing the mask and helmet. With each transaction the image of the person along with the transaction detail will be stored in cloud from which we can securely access anywhere and anytime (with proper authentication).","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127260490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A report on Alzheimer's disease Action and Semantical Fluency","authors":"A. Julaiha, B. Vasudevan","doi":"10.1109/ICSSS54381.2022.9782217","DOIUrl":"https://doi.org/10.1109/ICSSS54381.2022.9782217","url":null,"abstract":"The goal of this paper is to outline the relationship between onset and evident AD, as well as language functions and domains. With rising mortality and an older population, it is projected that almost 5.3 million individuals in India suffer from Alzheimer's disease. Even mild Alzheimer's disease causes linguistic alterations. Speech analysis is the best option since it accurately represents the speaker's brain function and data gathering is reasonably affordable when compared to brain imaging, blood tests, and other methods. Previously, researchers used the MMSE as one of the sources to detect the early start of Alzheimer's disease. We show that the progression from HA to AD is accompanied by a consistent pattern of speech changes, including an increase in duration and vocalization time, an increase in the number of pauses in speech, an emergence of modification in syllabic production, and reduced speech energy and intensity, resulting in speech disorder. Our planned research will provide a complete analysis of speech alterations in MCI and mild AD when compared to healthy ageing (HA), allowing harmful processes to be detected before clinical manifestations of AD. In the proposed work, we evaluate cognitive functions such as noting silence between words and their inaccuracy, which can play a significant role in recognizing the AD stages through emotional intelligence using a deep learning model. We can also add a cognitive phrase matching test to determine the severity of the Alzheimer's disease comprehension loss (AD) through emotional intelligence.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125390224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Naveenkumar, CK Rajesh Ram, M. Praveen, M. Maareyapan
{"title":"E -TOKEN Management System","authors":"M. Naveenkumar, CK Rajesh Ram, M. Praveen, M. Maareyapan","doi":"10.1109/ICSSS54381.2022.9782251","DOIUrl":"https://doi.org/10.1109/ICSSS54381.2022.9782251","url":null,"abstract":"Now-a-days lot of institutions and company are providing refreshment to their staffs by token system. But during break hour where rush between the staffs and canteen counter. On the canteen counter they collect the staffs token and then provide the snack for each faculty. And it may waste lots of time in the canteen and affects in working time. So, for the best alternative to switch from plastic token system to e-token system. For that each day admin will top-up staff's wallet through via the website. And then top-up amount will get reflected to all the staffs. Then each staff can order their snacks or food from their mobile app or website any time with their unique login id. Once the order is getting placed, it will be displayed in the canteens monitor and then food court servants will start preparing for that order. And then staffs can monitor their order status through their mobile app or through via the web app. Through the canteen webapp they can generate reports by daily, weekly or monthly bases.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125459930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Patient Health Monitoring System using IOT","authors":"M. V. Kumar Reddy, Konda. Sai Achyuth, S. Babu","doi":"10.1109/ICSSS54381.2022.9782193","DOIUrl":"https://doi.org/10.1109/ICSSS54381.2022.9782193","url":null,"abstract":"The purpose of doing this project is now a days health department plays key role than any other. This project design is more flexible and can easily monitored from anywhere by using smartphone. The need of IoT is very crucial anywhere. It is cheapest and components are available everywhere. Health is important in everyone life. By this project any person who has credentials of the software can monitor the patient temperature and pulse. The user can able to observe his temperature and pulse. In some emergency conditions we can take an immediate action within a short period of time. This IoT health monitoring system is used where the patient and doctors or health experts are at different locations. By this way patient can stay at home and can continue his routine life and health expert can observe patient health.Not only Health expert or doctor, we can also observe there pulse rate, body temperature and room temperature and aware of it.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128135263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Padmanaban L, V. S, Darwin N, Pavithra Sathvika Pati, Siva Nandhini Pati, Priyanka Ravilla
{"title":"Design of Low Power PMOS Biased Sense Amplifier Using Lector Approach","authors":"Padmanaban L, V. S, Darwin N, Pavithra Sathvika Pati, Siva Nandhini Pati, Priyanka Ravilla","doi":"10.1109/ICSSS54381.2022.9782187","DOIUrl":"https://doi.org/10.1109/ICSSS54381.2022.9782187","url":null,"abstract":"Sense Amplifiers plays an important role in memory circuits. These are fundamentally applied in volatile memory cells. Two new circuits of PMOS biased Sense Amplifier are proposed in the paper. This amplifier has low power dissipation, sense delay and more output impedance [1]. This proposed circuit carry out almost all operations like in conventional circuits however with lower power dissipation and Sense Delay by using LECTOR approach in power gating techniques. The proposed Sense Amplifier overall execution have been simulated and examined using Tanner EDA by employing 180nm technology file.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114618815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Breast Cancer Using Imaging Sensor and Mammogram - A Review","authors":"S. Nath, Anjaline Jayapraba A, K. Indhumathi","doi":"10.1109/ICSSS54381.2022.9782212","DOIUrl":"https://doi.org/10.1109/ICSSS54381.2022.9782212","url":null,"abstract":"Breast cancer killer of women. Mortality can be reduced if disease is early detected. Breast cancer leading the second cancer cause death all over the world. Conventional method of breast cancer detection is various disadvantage it's include high cost, heavy radiation and discomfort to patients. The alternative method to decrease the death rate is microwave imaging technique. The main objective of paper to provide various techniques in microwave imaging and hand held device for breast cancer detection.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Workload Clustering","authors":"Pranesh M, Sashank Visweshwaran, R. R. Sathiya","doi":"10.1109/ICSSS54381.2022.9782255","DOIUrl":"https://doi.org/10.1109/ICSSS54381.2022.9782255","url":null,"abstract":"With countless businesses and millions of customers dependent upon cloud infrastructure, cloud resource manage-ment is more critical now than ever. Workloads like VMs, Databases and micro services use cloud resources and their usage data is monitored by the cloud service providers. With the cloud workload data, workloads can be categorized based on their usage of CPU, Memory and Disk I/O Operations. Clustering the workload data based on these categories will infer an understanding of the characteristics of workloads, usage of resources and efficient allocation of resources to the cloud service providers. Multiple clustering methods are compared and analysed thereby helping in smooth scaling without impacting the QoS (Quality of Service) of existing users. In past, Disk IO operations weren't CPU bottlenecked due to their low Disk IOPS, but with rising IOPS in storage devices, it can be seen if this still holds true.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133503347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retinal Picture Investigation For The Early Recognition Of Diabetic Retinopathy","authors":"B. Devisri, M. Kavitha","doi":"10.1109/ICSSS54381.2022.9782234","DOIUrl":"https://doi.org/10.1109/ICSSS54381.2022.9782234","url":null,"abstract":"Diabetic retinopathy is a diabetes complication that cause damage to eyes and eye sight. It harms the light-delicate tissue in retinal veins at the retina. At the beginning stage, DR patients couldn't find any symptoms, only gentle vision issues they can experience. Recognizing retina fundus disorder ahead of time shields will safeguard the patients from losing their vision and assists the ophthalmologists with applying appropriate therapies that could get rid of the disease or reducing its seriousness. Image processing techniques can decrease the optician's diagnosing work and are utilized to detect the irregularities of fundus pictures which are captured during evaluation. This paper centers around Retinal blood vessels segmentation and discovery of exudates, which assumes to be a significant part in diagnosing the pathologies in early stage and also helps the optometric physician to detect the disease in early stage so as to prevent the DR sufferer from losing the eye sight. The proposed system is divided into two modules. I. Blood vessel segmentation and II. Exudate's detection and classification. The module I includes 1. pre-processing of input color fundus image 2. segmentation & classification. The pre-processing process includes image filtration & image enhancement using Weight Median filter and CLAHE histogram. Followed by pre-processing is Edge based segmentation techniques, declivity operator and morphological operations (Dilation, Thinning, opening and closing) are implemented for segmenting and classifying the retinal arteries. The module II:1. Initialization and Transformation to delineate the optic disk., 2. Nonlinear Diffusion Segmentation 3. Detection and classification of Exudates (Hard and delicate Exudates).","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"75 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113978103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach For Reduction of DDOS Attacks in Cloud Computing using Non-Parametric Hypothesis","authors":"V. Loganathan, S. Winster","doi":"10.1109/ICSSS54381.2022.9782267","DOIUrl":"https://doi.org/10.1109/ICSSS54381.2022.9782267","url":null,"abstract":"Cloud Computing is an innovative area of research in computer science, where a computer resource is delivered to the user, based on his demand. Due to the continuous evolution of Cloud computing, there has been an increased concern for a number of stakeholders about the data that is being stored in the cloud. The most vulnerable security issue in the cloud area is a Distributed Denial of Service (DDoS) attacker, which is one of the many cloud security problems. DDoS attackers, in particular, are a group of machines intent on disintegrating the services of current resources through the unnecessarily exhaustion of a single service. Furthermore, a large number of studies suggested that DDoS attacks were shifting their focus to cloud infrastructures and services. In the last decade, a variety of preventive measures for dealing with the effects of a DDoS assault on the cloud computing environment have been presented in the literature. In this paper, Through the potential advantages of inductive reasoning, the Kruskal Wallis Hypothesis Test-based Detection and Adaptive Load Balancing Scheme (KWHT-DDOS-ALBS) is contributed for effective detection of RoQ DDoS attacks, and the discrepancy in the pile of the cloud infrastructure is balanced through the adoption of the methodology. The suggested KWHT-DDOS-ALBS technique's simulation experiments revealed a superior detection rate and adaptive task scheduling rate of roughly 23% and 28%, respectively, as compared to the standard DDoS countermeasures under examination.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123266400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anuja Mary G Aloy, A. Farith Khan, S. Vishnukumar, K. Aanandha Sarvanan, B. Sathyasri
{"title":"Cumulative Sum Algorithm for Threshold Optimization in Cognitive Radio Networks","authors":"Anuja Mary G Aloy, A. Farith Khan, S. Vishnukumar, K. Aanandha Sarvanan, B. Sathyasri","doi":"10.1109/ICSSS54381.2022.9782243","DOIUrl":"https://doi.org/10.1109/ICSSS54381.2022.9782243","url":null,"abstract":"The connectivity process relies on radio links. It has been introduced to overcome the defects of wired communication. The demand on Wireless Applications increases, which leads to a limited spectrum utilization. Due to heavy mobile usage services, the whole spectrumhas been assigned only for licensed users (PU). The complete band remains unexploited by the principal users (PU). To overcome this issue, Cognitive Radio Networks (CRN) has been introduced. It has the ability to communicate with multiple users at a time by reusing the unused spectrum by its functions named as Handover and Range Sensing, which empowers us to examine for the fallow free ensembles and apply it. Handover procedure for CRN results in increasing throughput of unlicensed users. Our objective is to achieve the hand over procedure which consists of Threshold Optimization based on cumulative sum (CUSUM) algorithm using MATLAB software for further practical implementation.","PeriodicalId":186440,"journal":{"name":"2022 8th International Conference on Smart Structures and Systems (ICSSS)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122283417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}