B. SakthiKumar, M. Niranjana, M. Abinath, I.Guru Prasath, K. Jugasri, S. Kailash
{"title":"Survey On Smart Agriculture Using Iot","authors":"B. SakthiKumar, M. Niranjana, M. Abinath, I.Guru Prasath, K. Jugasri, S. Kailash","doi":"10.1109/ICCCI56745.2023.10128531","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128531","url":null,"abstract":"Each day, the agriculture sector in India loses ground on both sides, which reduces the ecosystem’s potential for production. To resuscitate agriculture and return it to a path of higher growth, a solution is increasingly needed. It takes a lot of maintenance, expertise, and management to maintain a large-scale agricultural system. The Internet of Things (IoT) is a system of networked devices that enables both automated job fulfilment and data transmission and reception through the internet. The crop yields are boosted by the abundance of data analysis parameters offered by the agricultural sector. Information and communication are modernized through the usage of IoT devices in smart farming. Soil moisture, minerals, light, and other elements can be expected for better crop growth. This study examines a handful of these traits for data analysis in an effort to help consumers use IoT to make better agricultural decisions in farming and irrigation. The method is designed to assist farmers in boosting agricultural productivity.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130529322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pyingkodi M, T. K., W. R, Selvaraj P A, K.Ajith Kumar, Aadarsh V, Mariya Arockiya Akash A
{"title":"Asthma Disease Risk Prediction Using Machine Learning Techniques","authors":"Pyingkodi M, T. K., W. R, Selvaraj P A, K.Ajith Kumar, Aadarsh V, Mariya Arockiya Akash A","doi":"10.1109/ICCCI56745.2023.10128635","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128635","url":null,"abstract":"The signs of asthma, a long-term inflammatory condition of the airways, include wheezing, throat tightness, coughing, and breathing difficulties. The attack of an asthma, which can be fatal, is the fast worsening of these symptoms. Another severe, irreversible airflow restriction in the lungs is caused by respiratory COPD, which encompasses emphysema and chronic bronchitis. In this project, a machine learning-based algorithm is for predicting asthma risk is presented (ML). PEFR, which are widely used external tools like peak flow meters and recognized asthma risk predictors, are frequently monitored. This study shows a relationship between the ambient particle matter(PM) and the weather outdoors. According to the best peak flow value each person was able to acquire, the results are divided into two groups: Safe and Risk circumstances. The link between indoor PM and weather data is mapped to the found values using a convolutional neural network (CNN) architecture. The suggested method’s root mean square and mean absolute error accuracy metrics are contrasted with those of current deep neural network (DNN)-based methods. Additionally, the accuracy of the classification methods KNN and SVM are carried out. The new data set’s asthma category may be predicted more accurately thanks to the application of SVM, KNN, and CNN classification. Python 3.7 is the coding language employed.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129126900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Peculiar Image Encryption Technique For Mobile Application","authors":"R. Krithika, J. Ponsam","doi":"10.1109/ICCCI56745.2023.10128518","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128518","url":null,"abstract":"The upgradation in the field of mobile applications is predominantly increasing. Nowadays mobile applications are used in various platforms on one-handled devices in addition, attackers can use similar technology to anonymize their malicious behaviors and hide their identification of behaviors. Thus, security is important. In this project, we are focusing on the precautionary encryption and decryption algorithms like PNSR metric and Elliptic curve Digital signature algorithm which help us to provide secured transmission of a personal image between the mobile stations. Based on these algorithms a defense application will be developed. There are 4 different levels of technology that will be applied in this project which help to improve security transmission. The first level is selecting a secret image. The secret image will support file types like jpg,png. In the second level of security, we encode the image that we get from thefirst level using an encryption algorithm. Here the image quality is measured by using PSNR metric, the third level is finding the LSB, along with 3m (Mean,Mean,Mode) of the image to hide the message inside the cover image. Then the obtained stegnographic image is compressed using GZIP is the final security level. An Elliptic curve, a Digital signature algorithm is used to enhancea security process. Therefore, this method is suggested to send a secret message through applications of special importance across the mobile application.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130682194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Praneetha, Perela Narayana Nithesh, Pinni Venkata Sai Sumanth Kumar, T. Vignesh
{"title":"Classical Review On Stock Prognosis Using Long Short Term Memory","authors":"K. Praneetha, Perela Narayana Nithesh, Pinni Venkata Sai Sumanth Kumar, T. Vignesh","doi":"10.1109/ICCCI56745.2023.10128350","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128350","url":null,"abstract":"The main plot of this project is to compare different methods that primarily finds the stock prediction. There are so many machine learning and neurocomputing fields to predict the stock values. Stock price forecasting uses machine learning effectively. Various learning methods are available, including Moving Average (MA), K-nearest Neighbors (KNN), LSTM (Long Short Term Memory), and ARIMA.. LSTM is a type of ANN and RNN neural networks. Because in deep learning they are capable of storing the data in memory. But out of this Long Short-Term Memory(LSTM) is unique compares with other. Because it is used to create long term memory. LSTM performs better in big datasets. It has more additional space to store longer information and it stores longer period of time. While compare to other techniques they can’t store more data like LSTM does. In LSTM we use visualization method so, it is easy to compare the data and find the accuracy value. we used apple and google company datasets to perform LSTM. And here in the papers which we used as reference they performed on datasets namely- Chinese stock market data, Yahoo finance dataset(900000), BSE stocks Tick data, LM SCG, 4 year data of NASDAQ,100 stock market data of NASDAQ stocks. LSTM method gave us best accurate value so we choose LSTM method from others. The main objective of this paper is to find the accurate value of stock market using machine learning through best method out of all available. so we choose LSTM method.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123918782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Inference Approach on Massive datasets using MapReduce","authors":"M. Priadarsini, M. Dharani","doi":"10.1109/ICCCI56745.2023.10128196","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128196","url":null,"abstract":"Contemporary computer systems and applications generate high volume of data every day. Gaining knowledge from this ever-growing high velocity and high volume data is crucial to have insights and business intelligence. Using semantic web approaches for generating inferences to gain knowledge have been quite successful. When processing large amounts of data, a centralised method for finding inferences in ontologies will be ineffective. Therefore, to solve this problem, a distributed strategy is needed. The major challenges on large scale data are the difficulty in deriving suitable triples for appropriate inferences, to reduce the time spent in processing of inference and the requirement of scalable computation capabilities for large dataset. Also, storage space for increasing data must be addressed efficiently. This paper proposes a distributed conjecture approach to address the above issues by construction of SIM (Sparse Index Method) and ATC (Assertional Triples Construction) and to efficiently process the users’ queries.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Naveenkumaran, S. Geetha, Kaushik Selvaraju, C. Kishore, A. Nagha Rathish
{"title":"Blockchain Based Crowd Funding","authors":"R. Naveenkumaran, S. Geetha, Kaushik Selvaraju, C. Kishore, A. Nagha Rathish","doi":"10.1109/ICCCI56745.2023.10128334","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128334","url":null,"abstract":"Crowdfunding is a method of online fundraising process that was initially developed for public members to make modest contributions to support the projects of creative individuals. Crowdfunding uses blockchain technology to offer smart contracts for users. This allows us to offer crowdfunding in a secure, transparent, and safe manner. The task of this work is to provide interactive forms for campaign development and financial contributions. Both campaign makers and donors may develop and support the campaigns by viewing or submitting requests for approval and fulfilling requests using this system. In addition, the donor may be able to see the progress of the funds they provide. All transactions will be recorded on the blockchain and stored as blocks. It is alluring to use smart contracts in blockchain. Without the aid of a trustworthy third party, a blockchain-based agreement must be negotiated, carried out, and enforced amongst unreliable participants. It is essential to develop executable code that runs on the blockchain. Blockchain was initially primarily used as the basis for cryptocurrencies, but in recent years, it has expanded to various industries. Blockchain is anticipated to be the most widely used technology as a green way to conduct internet transactions One application area for blockchain technology is crowdfunding websites. The biggest problem with today’s global crowdfunding market is that campaigns are no longer under strict control, and some crowd- investment efforts have proven fake. By utilizing Ethereum smart contracts on the crowdfunding site, this work aims to allay these worries by assuring that the initiatives may be added within the designated time limit, eliminating fraud, and allowing the contracts to be fully mechanically performed.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123468288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial Emotion Recognition for Students Using Machine Learning","authors":"V. Pandimurugan, Angad Singh, Akash Tiwari","doi":"10.1109/ICCCI56745.2023.10128425","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128425","url":null,"abstract":"It is important to note that while machine learning and artificial intelligence can have a positive impact on society, they also come with ethical concerns. One major concern in this case is privacy. It is important to ensure that the students’ privacy is respected and their facial data is not misused. It is also important to ensure that the system is not used for discriminatory purposes, such as identifying students based on race or ethnicity. Another concern is the accuracy of the emotion recognition system. While machine learning algorithms can be trained to recognize emotions, there is still a margin of error. It is important to regularly test and improve the accuracy of the system, and to ensure that the system is not making incorrect assumptions about a student’s emotional state. Overall, the use of machine learning and artificial intelligence in identifying student emotions can have a positive impact on their mental wellbeing. However, it is important to approach this technology with caution and to ensure that it is being used ethically and responsibly.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123637765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dennis Mathew, G. Kirubasri, K. Vijay, I. Eugene Berna, K. Sowmia
{"title":"System for Detecting Intrusions using Raspberry PI","authors":"Dennis Mathew, G. Kirubasri, K. Vijay, I. Eugene Berna, K. Sowmia","doi":"10.1109/ICCCI56745.2023.10128487","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128487","url":null,"abstract":"Home invasions and thefts have gotten far too frequent in recent years. However, it is uncommon for people to be familiar with different systems, such as intrusion detectors, surveillance systems, and so on. The average person finds it challenging to maintain his home secure as a result. CCTV cameras are expensive in surveillance since they employ computers. It sets aside an excessive amount of space for ongoing recording and needs personnel to find irregularities. Our goal is to develop a comprehensive home security system that will help homeowners protect their properties from such disasters. The Raspberry Pi4-based Home Security System project aims to let someone secure their home against burglary and theft in one go. However, the Raspberry Pi system is significantly less expensive, has greater resolution, and has capabilities that use less power than the current system. Here, infrared (IR) sensors are used as straightforward yet effective triggers for human presence. For tiny confidential data area surveillance, this solution is appropriate. i.e., a home office, a bank restroom, etc. The image is taken by the camera and momentarily saved in the Raspberry Pi module whenever motion is detected by the PIR sensor within the room. Applications built on the Internet of Things can be used remotely to monitor activities and receive alerts when motion is detected.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114221934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Ram, Prem Savarinathan, Thenmozhi Karuppasamy, Avila Jayapalan
{"title":"IOT Based Detection of Food And Water Contamination","authors":"R. Ram, Prem Savarinathan, Thenmozhi Karuppasamy, Avila Jayapalan","doi":"10.1109/ICCCI56745.2023.10128393","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128393","url":null,"abstract":"Food has a major role in the promotion of health and prevention of many diseases. With an increase in the population, food quality is being decreased day by day. Nowadays, many inorganic components are mixed with food materials, and many chemicals are used to preserve food to meet food demand. These chemicals contaminate food and lead to many health issues. Water is one of the basic sources for all the living organisms on the earth. Water is also getting contaminated in many ways and this contamination results in the birth of new diseases. To overcome these problems, there is a need for a device to detect the contamination of food and water. Internet of Things (IoT) is growing rapidly and becoming a vast source of information. IoT has a great feature in detecting food and water quality. By connecting the Arduino and sensors the quality of food and water can be detected and by utilizing Wi-Fi module the information can be transmitted. Water samples are collected from various sources like tap, borewell and wells in the local environment. Various Junk food items, fruits and milk quality is tested under food category with the aid of sensors. If contamination has been detected then the information is passed on to the officials in the Department of Food Safety and Drug administration for further action. In this way, effectively checking food and water quality avoids food and water-borne illness and paves a way to lead a healthy life.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114347492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent System to Assess the Exterior Vehicular Damage based on DCNN","authors":"K. Meenakshi, S. Sivasubramanian","doi":"10.1109/ICCCI56745.2023.10128579","DOIUrl":"https://doi.org/10.1109/ICCCI56745.2023.10128579","url":null,"abstract":"In today’s world, with all the technological advancements that we have made, the process of car damage detection is a very lengthy process involving a lot manual work. It requires human verification approach which is very slow and leads to an extremely arduous and tardy process, which leads to human error creeping into the results, thereby increasing the hardships of the common man. Proliferation of Indian automobile industry is directly proportional to the car incidents which is also directly proportional to more insurance claims. Insurance companies need to cover many simultaneous claims and solve the issue related to claims leakage. We explore different DNN based techniques for the purpose of the vehicle damage detection which will completely eliminate the large amount of paper work and man power for physical damage estimation and shift this entire process to an efficient AI based solution which can provide a rapid claim process in a shorter time span. The proposed model provides high accuracy confidence scores for the detected damages which are classified on the basis of the 21 vehicle damage classes that we have defined so that there can be an extensive segregation of damages incurred by the vehicle.","PeriodicalId":205683,"journal":{"name":"2023 International Conference on Computer Communication and Informatics (ICCCI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116202666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}