{"title":"Chronic Kidney Disease Prediction","authors":"Venkata Sai Pilli, Kumar Pamidi, P. E","doi":"10.1109/ICONAT57137.2023.10080709","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080709","url":null,"abstract":"Chronic kidney disease is a serious health problem. With the help of Machine learning Techniques, doctors can predict it earlier. The research also contributes to Sustainable goal 3 - Basic Health and well being. To predict the disease different Machine learning Algorithms like logistic regression, Decision tree, Random Forest, Support Vector Classifier are used and best suitable algorithm is analyzed. Data prepossessing is done depending on the requirement. Training is given depending on the model chosen. It is found that Random Forest model gives best accuracy - 99.1% with all features. Further, it is trained by choosing the best five features arrived using chi-square test but the accuracy is 93.5% for same Random Forest Classifier. Again, it is trained by choosing the best three features arrived using chi-square test but the accuracy is 85% for same Random Forest Classifier. Performance analysis of different algorithms and choosing the algorithm based on true negative value in confusion matrix.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124438438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tanzil Ahmed, Salman Rahman, A. Mahmud, Md. Abdur Razzak, Dr. Nusrat Sharmin
{"title":"Bullet Hole Detection in a Military Domain Using Mask R-CNN and ResNet-50","authors":"Tanzil Ahmed, Salman Rahman, A. Mahmud, Md. Abdur Razzak, Dr. Nusrat Sharmin","doi":"10.1109/ICONAT57137.2023.10080859","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080859","url":null,"abstract":"Small arms shooting practices and competitions are routine activities in the military domain. The shooting group or bullet group analysis serves as a metric for the precision of a weapon, the shooter’s accuracy, and consistency, and as a method for improving or refining one’s shooting abilities. This analysis mechanism, however, is either manual or semi-automatic, employing image processing-based algorithms such as template matching, histogram equalization, white balancing, median and gaussian altering, peak detection, and image subtraction in an indoor setting, which is incapable of adapting to environmental conditions such as humidity, temperature, ambient light, wind speed, and rain, among others. Recent advancements in artificial intelligence or deep learning techniques explored ways to facilitate automation in various sectors. In this paper, we have used such deep learning approaches to automize the shooting system in real-time within a military domain and achieved success in resolving the traditional image processing drawbacks. Our proposed methodology has two phases. The first phase uses Mask R-CNN a conceptually simple, flexible, and general framework for object instance segmentation to extract the target region from the environment, and in the second phase, we fed the output segmented target of the first phase to ResNet-50 a convolutional neural network architecture to detect the bullet holes. Several experiments have been conducted on real-time datasets and the results show 0.87 of average precision using mask R-CNN to segment the target and ResNet-50 give 0.80 to detect bullet holes.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114650735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-Cost Wearable Device to Provide an Effective Solution for Contact Tracing and Logistics","authors":"Vasant Joseph, Souparnika K S, Sidharth Haridas","doi":"10.1109/ICONAT57137.2023.10080852","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080852","url":null,"abstract":"The paper introduces a low-cost wearable band that does the tedious, repetitive task of entering your required details in any shop or organization, as well as keeping a record of all the people you have come in contact with. There are two aspects of our device:1)If a person enters a shop with our device, the band will transmit the required information of the wearer to the reader kept at the shopkeeper’s side wirelessly. The transmitted information will include the wearer’s information (as per government guidelines) masked in the band’s Unique ID along with their temperature status (whether having a temperature above 100°F or not).2)When two persons come near each other over a distance of 6 feet, the unique ID broadcasted from each other’s bands gets stored in the other’s band. If any of them tests positive for Coronavirus Disease (COVID-19) or similar diseases, his/her unique ID can be used to trace primary contacts and take appropriate steps to contain further spread.Privacy is key! So, we are reengineering the primary concept of contact tracing and logistics while keeping the user’s information safe and secure.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"497 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120879577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stationary Human Target Detection Based on Millimeter Wave Radar in Complex Scenarios","authors":"Qianhui Li, Minglei Yang, Zhiwei Wang, Haohui Chen","doi":"10.1109/ICONAT57137.2023.10080760","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080760","url":null,"abstract":"Millimeter wave radar has been widely used in target detection due to its high ranging accuracy and strong non-contact. Currently, most studies adopted breathing and heartbeat signatures to detect stationary human targets. However, this method requires long detection time and leads to low positioning accuracy. To this end, a novel fretting phase variation characteristics detection method based on millimeter wave radar is proposed to locate multiple stationary human targets in the practical scenarios. The experimental results show that the proposed method can accurately locate stationary human targets even if the targets are not directly in front of the radar.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121245950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Consumption Saving in 5G Network Based on Artificial Intelligence","authors":"Debarun Ghosh, S. Bharathi","doi":"10.1109/ICONAT57137.2023.10080476","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080476","url":null,"abstract":"Fifth generation (5G) technology is tasked with tackling the challenge of energy efficiency. As a result, the problem of selecting the optimal set of cells to be turned OFF is nondeterministic polynomial time hard. 5G is more than just a generational step; it opens a new world of possibilities. There are several ways to develop a nation, and Information and Communication Technology will be the best enabler toward realizing this challenge. The exponential increase in network traffic and the number of connected devices make energy efficiency an increasingly important concern for the entire technological ecosystem. With that in mind, we shall discuss some of the proven works related to the topic, such as the Genetic Algorithm (GA), Particle Swarm Optimization (PSO) algorithms, controlling PDCCH channel skipping in sectors of IIoT (3GPP of 5G), and many other related solutions to the most vital element of concern.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121334826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Scheduling of Residential Loads Using Binary Particle Swarm Optimization (BPSO) Algorithm","authors":"R. Disanayaka, K. Hemapala","doi":"10.1109/ICONAT57137.2023.10080137","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080137","url":null,"abstract":"It has been seen that the power distribution in the networks is becoming more complex and heavily stressed due to the development of decentralized energy resources. In such cases, Demand Side Management (DSM) programs can be utilized in order to maintain the flexibility of the system by alternating the consumption patterns of the customers as well as controlling the loads of the main distribution network. The exploitation of artificial intelligence (AI) methods in DSM applications has been developed in recent years and Particle Swarm Optimization (PSO) is one of the highly accurate methods for resource scheduling and dispatching economically. The research is focused on optimal scheduling of residential loads using the Binary Particle Swarm Optimization (BPSO) algorithm which is the binary version of the widely used PSO algorithm and the aim of this research is to minimize the monthly electricity cost of a typical household based on the Time of Use (TOU) tariff scheme.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124827286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Cost-Effective Smart Mirror Using Raspberry Pi","authors":"A. Barbadekar, Sarthak Bhake, Sahil Parekh","doi":"10.1109/ICONAT57137.2023.10080844","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080844","url":null,"abstract":"As the technology becomes more and more advanced with time, automations are taking over our day to day lives. More and more innovations are being done in this space to enable people getting exposed to technology and in turn live a tech-supported lifestyle. This research paper proposes a model of a Smart Mirror which is a normal mirror but with which the user can interact. The proposed model is robust and full of features which can be directly used in a person’s day to day life. The proposed model consists of two subsystems namely software and hardware, they both work in unison to make a complete end to end device. The hardware sub system of the model includes a Raspberry Pi and a few other components. While the software sub system enables the functioning of the proposed system. The core of the smart mirror is the Magic Mirror module which stores all the APIs for the features which the model incorporates. These APIs are critical as they help in fetching real time information. The proposed model has features like Calendar, Music App, Weather Forecast, News etc, the model can be scaled to add as many features as one can in order to make it customized. The ability of the proposed model to use APIs and add more features makes it more robust and cost-effective in general.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Santhosh Krishna B V, B. Rajalakshmi, U. Dhammini, M. Monika, C. Nethra, K. Ashok
{"title":"Image De-hazing techniques for Vision based applications - A survey","authors":"Santhosh Krishna B V, B. Rajalakshmi, U. Dhammini, M. Monika, C. Nethra, K. Ashok","doi":"10.1109/ICONAT57137.2023.10080156","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080156","url":null,"abstract":"Haze is defined as a poor condition described by an iridescent atmospheric appearance that reduces clarity and visibility. The main reason for this is lot of toxic elements like dust particles, smoke in the atmosphere scattering and absorbing sun light. This poor intelligibility causes various computer vision applications to fail, including intelligent transportation, video surveillance, element recognition, and in a method to perform operations on image to get better image. There is a problem in domain of image processing wherein image recovery by various degradations is a challenge. Pictures and videos taken in outdoor environments usually suffer from reduced contrast, faded colors and with reduced visibility due to airborne particles, which directly affect image quality. This can lead to problems recognizing objects captured in blurry or still images. Several images clean up techniques have been developed to solve this problem, each with their own strengths and weaknesses, but effective image recovery is daunting task. Recently, many learning-based methods (predictive analytics and natural language processing) have tried to overcome the shortcomings of mechanical representation of properties and alleviated the challenge of efficiently reconstructing images by spending with reduce cost and comparatively reduced time. This overview delves into latest techniques for imaging with no-fog. In addition, hardware execution of many real time dehaze methods have been methodically outlined by this paper. The study done in this paper paves a way for researches in image dehazing domain as-well-as will direct them for doing further enhancement on the basis of achievements done currently.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115105364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Machine Learning-Based Malware Detection Techniques in Smartphone Environment","authors":"P. Baviskar, Guddi Singh, V. Patil","doi":"10.1109/ICONAT57137.2023.10080819","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080819","url":null,"abstract":"Hackers are spreading malware by using Android mobile devices and apps. Malware detection in Android apps is a topic of study. How can we use ML to identify harmful software in Android-based gadgets and programs? If Android apps could detect malware in real-time, it may better protect users from it. To put it simply, it will assist Android users to avoid downloading harmful apps. To aid in supervised learning, the suggested technique gathers features from APK files. Multinomial Naive Bayes, Random Forest, and Support Vector Machines are only a few of the prediction models available (SVM). To counteract harmful malware, Android devices and apps may rely on a foundation created by ML methods. There is more backing for the solution proposed. More and more malware is being discovered, and hence more training data is being collected. When more data is used for training, accuracy improves. Small tweaks might make it possible to live-track Android apps on rival devices.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122832378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Chavare, Rushikesh Joshi, Om Wagh, Aditya Vaishale, Aditya Ingale
{"title":"Car Sales Price Prediction using MLR, Random Forest and Support Vector Machine","authors":"R. Chavare, Rushikesh Joshi, Om Wagh, Aditya Vaishale, Aditya Ingale","doi":"10.1109/ICONAT57137.2023.10080025","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080025","url":null,"abstract":"This paper focuses on the car sales dataset and the algorithm required to remove the desired prediction. This data set is officially collected from cars24.com, which describes the selling price of second-hand vehicles based on other parameters. The purpose of this study is to discuss different algorithms that can be applied to obtain the prediction and the accuracy of the data. Different obstacles were faced while designing the algorithms.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123004266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}