{"title":"ECC-based Authentication for Secure TDMA in VANETs","authors":"Suchi Johari, M. Krishna","doi":"10.1109/ICCCI56745.2023.10128221","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128221","url":null,"abstract":"Secure TDMA in VANET is the allocation of the time slot to authentic nodes. The trusted authority verifies the node authenticity and notifies the malicious nodes to RSU. Malicious nodes replicate the identity of the authentic nodes in V2V communication. Multiple time slot requests by malicious nodes in the same frame can lead to vulnerabilities in the network. This paper focuses on secure time slot allocation for vehicles using ECC-based authentication. Registration and key exchange, sharing of the one-time session key by RSU with the vehicle, and secure V2V communication are considered in the proposed ECC approach. The registered vehicles are authenticated. RSU shares the one-time session key, allocates the time slot to the vehicle, and secures the V2V communication. The malicious nodes are identified based on a unique ID and one-time session key generated by RSU. Simulation results are compared with existing approaches.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115655218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Framework for Identification of Leaf Diseases in Native Plants of Tamil Nadu Geographical Region","authors":"K. Kavitha, S. Naveena","doi":"10.1109/ICCCI56745.2023.10128593","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128593","url":null,"abstract":"Plant pathogens are a prominent cause of reduced yields, resulting in decreased crop yields. Scientists are striving to develop a mechanism for identifying plant ailments in order to boost farm output. Deep learning algorithms have been developed for pathogen recognition and prediction in tomato plant leaves. Two different types of diseases impact both healthy and sick leaves. A Convolution Neural Network, which is effective for detection and prediction barrier, was used to forecast Septoria spot and bacterial spot. A dataset of 4930 images of healthy and damaged leaves from a plant community is used for the experiments. The model’s performance is precisely evaluated, and the conclusion is accurate. The project makes use of Plant Village images of tomato, potato, and onion leaves. Four different classes can each be recognized by the suggested CNNs. In each instance, the trained model achieves accuracy of 100%, 98.3%, and 97.89%. The classification of leaf disease detection using simulation data shows the potential effectiveness of the proposed approach. The algorithm proposed can be applied to categories any additional species of native plant to Tamil Nadu. Self Help Groups (SHGs), which are found in each and every village in India, will be utilized to gather information on how farmers see themselves. The observations and ameliorate both will be communicated to the same SHGs. Because of its high success rate, the model is a good tool for counselling or early warning.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114190288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPROVE: Intelligent Machine Learning based Portable, Reliable and Optimal VErification System for Future Vehicles","authors":"A. S. Shreyas Madhav, A. Mohan, A. Tyagi","doi":"10.1109/ICCCI56745.2023.10128616","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128616","url":null,"abstract":"The technological progress over the past decade has revolutionized the transportation domain. Autonomous and semi-autonomous vehicles have now gained the global spotlight for facilitating personal transportation with minimal manual intervention. The digitization of this industry has been accompanied by significant security challenges in terms of ensuring reliable transmission and robust communication networks which are critical for the proper functioning of the smart vehicle. The CAN bus architecture responsible to establishing connectivity within the various vital components of the car’s internal architecture is a prime target for intrusions. Secure connections must also be established between the vehicle and external devices such as smartphones for enhancing the travel experience. Hence a complete security intrusion detection framework for self-driving cars is of dire need. This article introduces an Intelligent Machine Learning based Portable, Reliable and Optimal VErification System (IMPROVE) for Future Vehicles that aims to provide a viable solution to resist vehicular cyberattacks both on the internal network of the vehicle and the vehicle to device network established. The proposed framework is twofold in nature- The initial module focusses on ensuring Controller Area Network (CAN) security through machine learning modelling for intrusion detection. The second module is oriented towards utilizing data analysis to detect and block malicious behaviour on networks established with external/internal devices.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114311624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Roshini, P. Durgaprasadarao, R. Sai Sarvan, L. V. Koushik Varma U, V. Sireesha
{"title":"High Precision Non-Invasiveblood Glucose Monitoring Device For Diabetic Patients","authors":"Y. Roshini, P. Durgaprasadarao, R. Sai Sarvan, L. V. Koushik Varma U, V. Sireesha","doi":"10.1109/ICCCI56745.2023.10128321","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128321","url":null,"abstract":"One of the leading causes of sudden illness and mortality among non-contagious diseases is diabetes. In their daily lives, people with diabetes need to strike a balance between the three crucial components of food, activity, and medicine. As a result, it is essential to continuously check blood glucose levels when treating diabetes. The state of the diabetic patient can be improved by lifestyle changes that control blood sugar, cholesterol, and blood pressure. Using a self-monitoring glucose meter is the preferred way for determining blood glucose levels. which is intrusive, uncomfortable, and expensive. As a result, there is an increasing need for non-invasive, dependable glucose monitoring methods. The development of non-invasive blood glucose monitoring technologies has attracted the attention of researchers from all over the world.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117127347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ganne Vaishnavi, R. Sumathi, Karnatakam Anvitha, Dhathri Bathineed, Balabhadra Nikhitha, K. Vanaja
{"title":"Music Recommendation Based on Facial Expressions and Mood Detection using CNN","authors":"Ganne Vaishnavi, R. Sumathi, Karnatakam Anvitha, Dhathri Bathineed, Balabhadra Nikhitha, K. Vanaja","doi":"10.1109/ICCCI56745.2023.10128353","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128353","url":null,"abstract":"Music is considered as global language. That can connect the people in all over the world. Music has the great ability to evoke different emotions in people. Music has great impact on our emotions. It is also a means of mood regulation. In the proposed system, music playlist is created by detecting emotions. A user’s emotion is detected by people facial expressions. The facial expressions can be detected lively by system’s camera. The convolutional Neural Network is used for emotion detection. Pygame and Tinker are used for music recommendation. Feature extraction is performed on input images to detect emotions such as happy, sad, chill. A music playlist is created based on our mood","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117184932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COVID 19 post-vaccination adverse effects prediction with supervised machine learning models","authors":"Vaishali Ravindranath, S. Balakrishnan","doi":"10.1109/ICCCI56745.2023.10128441","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128441","url":null,"abstract":"This electronic Pharmacovigilance with AI helps to trace possible adverse events among the vaccinated population. The symptom pattern discovery from the vaccinated population obtained through post-vaccination surveys provides insights for medical practitioners to study the possibility of adverse events among vulnerable populations. This work contains postvaccination survey data from an Indonesian national referral hospital with 840 instances, 6 categorical input features, and 15 binary target attributes. As there were multiple symptoms as a target, multi-target classification algorithms experimented on the dataset. The inadequate sample size resulted in poor performance of the algorithm. To improve model prediction performance, the target was converted into binary format. The population that exhibited at least one symptom is considered symptomatic by the binary classification models. The supervised machine learning model of test train split (80%- 20%) produced 89% accuracy with a decision tree classification algorithm in the classification of symptomatic or non-symptomatic patients.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117286019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Chinnasamy, A. Elumalai, R. Ayyasamy, S.P. Kavya, S. Dhanasekaran, A. Kiran
{"title":"BookChain: A Secure Library Book Storing and Sharing in Academic Institutions using Blockchain Technology","authors":"P. Chinnasamy, A. Elumalai, R. Ayyasamy, S.P. Kavya, S. Dhanasekaran, A. Kiran","doi":"10.1109/ICCCI56745.2023.10128571","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128571","url":null,"abstract":"By exploiting wireless operators, contemporary bookcrossing allows people to share books conveniently and hastens the spread of knowledge. Nevertheless, the widespread use of smartphone bookcrossing has been seriously hampered by the lack of tracking, resulting in missing and disappearance of textbooks, additionally, it leads to organizational inefficiency. Hence, we suggest using the emerging blockchain technology to exploit the advantages of its immutability and encrypted smart contract in order to overcome these difficulties. In this research, we propose a BookChain, a blockchain-based intra-campus book-sharing system that is verifiable and effective. BookChain securely records all of the book’s interacting entities on blockchain because every consumer could retrace the book’s renting activity, hence lowering the risk of a book being misplaced. Additionally, BookChain promotes the use of smart contracts to streamline the distribution of books with very little human interference, maximizing productivity. The experimental findings demonstrate the efficiency and affordability of the suggested system even with a large number of concurrent participants.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123462128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Yara Rules in Android","authors":"Pragya Bharti, Shreya Saha Roy, A. Suresh","doi":"10.1109/ICCCI56745.2023.10128288","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128288","url":null,"abstract":"Malwares are malicious softwares aimed to damage and destroy computer systems and networks. Malware can exist in a wide variety of devices and operating systems. Cryptographic hashing and fuzzy hashing are two types of signature-based malware detection and classification techniques. In this paper we have tried to study the implementation of YARA rules in Android operating system, the properties of YARA rules and how it helps in an efficient detection of malicious android applications in the market. We outline the syntactical structure of YARA rules, their use cases, and how to create a YARA rule for a single malware or a family of malwares using Androguard and Cuckoo.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124695241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accident Prevention System using Machine Learning","authors":"Srihan Thokala, Rohith Jakkani, Murari Alli, Hariharan Shanmugasundaram","doi":"10.1109/ICCCI56745.2023.10128202","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128202","url":null,"abstract":"Most of the Accidents Occur in these days are during the Night time. As per the Reports of the Accident, Most of the Accidents are due to Improper vision of the Drivers during the Night time. In order to minimize and prevent the Accidents we came with a Machine Learning Model Which Continuously Monitors the Road in the Range of 20 Meters and Specifies if there are any people or Animals passing across the Road. The Significance of the project is to help the innocent people who might lost their lives due to the Accident without their intervention. The Model is also useful for the animals and passers. The main purpose of the project is to detect strollers or animals like dog at night and dim light conditions. As the light intensity during night is less, Even our human eye cannot detect a person. The existing system are less effective due to the less accuracy of algorithms. The night-vision systems indeed work on mainly image processing with assistance of camera and processing units.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124970946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mano Ashish Tripathi, Ravikesh Tripathi, Femmy Effendy, Geetha Manoharan, M. John Paul, Mohd Aarif
{"title":"An In-Depth Analysis of the Role That ML and Big Data Play in Driving Digital Marketing’s Paradigm Shift","authors":"Mano Ashish Tripathi, Ravikesh Tripathi, Femmy Effendy, Geetha Manoharan, M. John Paul, Mohd Aarif","doi":"10.1109/ICCCI56745.2023.10128357","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128357","url":null,"abstract":"Machine learning (ML) is an artificial neural network (ANN) that helps developers improve their software’s predictive abilities before they have all the data they need. Because information is so priceless, progress toward fully autonomous agents requires better methods for managing the omnipresent content infrastructures that exist today. All sorts of fields have benefited from advancements in computer vision and AI, from medical diagnosis to data presentation and operations to scientific study, and so on. Learning from polluted or erroneous data may be expensive, much as training for a sport can be dangerous to those who are vulnerable to injury. An organization will incur costs rather than see benefits if its algorithms are improperly taught, as explained in Approaching Data Science. Organizations need to be able to verify the quality and consistency of any large datasets, as well as their sources, to ensure the efficacy of any algorithm.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}