{"title":"Analysis of Factors Affecting the Development of Socio-Economic Systems of Vietnam Based on Combinatorial Methods","authors":"Dung Nguyen Thi Thu, L. Chernenkaya","doi":"10.1109/ICONAT57137.2023.10080736","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080736","url":null,"abstract":"Nowadays, the widespread use of methods of mathematical statistics in assessing the development of socioeconomic systems of regions. The method of analysis of the development of socio-economic systems of the regions of Vietnam on the basis of Fuzzy C-means with the help of Fuzzy gap statistics and python programming language is proposed. The result of the study divided the socio-economic systems of the regions of Vietnam into 4 groups and identify regions that can belong to more than 1 cluster with a defined probability. The application of Fuzzy C-means using Fuzzy gap statistics showed reliable and efficient allocation of regions in the groups. The disadvantage of applying Fuzzy C-means is the high computational complexity, which leads to higher implementation time of the algorithm. The work is recommended to be applied to students, specialists in the field of assessing the quality of the development of socio-economic systems or other areas of the country.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114151283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jyoti Madake, Shlok Yadav, Shaurya Singh, S. Bhatlawande, S. Shilaskar
{"title":"Vision-based Driver’s Seat Belt Detection","authors":"Jyoti Madake, Shlok Yadav, Shaurya Singh, S. Bhatlawande, S. Shilaskar","doi":"10.1109/ICONAT57137.2023.10080147","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080147","url":null,"abstract":"This paper focuses on seatbelt detection for assisted driving scenarios. Seatbelt detection is important to ensure driver and passenger safety. The algorithm ensures high classification accuracy against practical constraints like dynamic environments, improper in-vehicle illumination, low-quality images, and view angle variations. The paper proposes a real-time implementation of a system to detect the seatbelt. This system uses a FAST key point detector with scale invariance, good localization, and robustness to noise. It uses the BRIEF method for the robust, highly discriminative, and efficient description of key points. The feature vector optimization is done using K-means and PCA. The effectiveness of the proposed method is verified by a comparative analysis of six different feature extraction methods run through five different classifiers and the results were studied. The most effective classifier of the lot turned out to be Decision Trees.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114567399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Descriptive Analysis of the Cloud Computing Services and Deployment Models","authors":"T. Kaur, Sushil Kamboj","doi":"10.1109/ICONAT57137.2023.10080749","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080749","url":null,"abstract":"Cloud have wide-ranging implications in several areas of computing, notably massive knowledge, cloud computing has simply up to the highest of any list of technology subjects. Furthermore, it is one of the most important chop-chop developing technologies due to the availability of a wide range of computer infrastructure and services. The expansion of cloud computing has included mainframe computing, cluster and grid computing, distributed and parallel computing technologies, and so on. Cloud computing has mostly supplanted grid, cluster, and mainframe computing. This refers to the delivery of numerous services over the web differently. Such as databases, infrastructure, run time platforms, knowledge storage, servers, networking, and code area unit samples of these resources. Price savings, bigger productivity, speed, efficiency, high performance, high computing power, and security are simply many of the explanations why consumers and businesses embrace the on demand computing. This article goes through the definition of cloud computing as well as its properties, various cloud services, deployment models, and security concerns.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121908161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chandra Hermawan Heruatmadja, Meyliana, A. Hidayanto, Harjanto Prabowo
{"title":"Biometric as Secure Authentication for Virtual Reality Environment: A Systematic Literature Review","authors":"Chandra Hermawan Heruatmadja, Meyliana, A. Hidayanto, Harjanto Prabowo","doi":"10.1109/ICONAT57137.2023.10080713","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080713","url":null,"abstract":"Virtual Reality (VR) is a type of technology that enables users to interact each other inside artificial environments. While this technology makes life easier, it also creates new issues, particularly in the areas of security and authentication. In contrast to authentication techniques in general, where users can use a pin or password safely and securely, in VR this security model creates a new security loophole and the better authentication method and more secure authentication in virtual reality have both been the subject of numerous studies including using biometric. In order to learn more about biometric authentication, which is the most common issue in VR authentication research, this research is conducted in a systematic literature review to answer the research questions what biometric media, HeadMounted Display (HMD), also examines what machine learning and biometric media are frequently used, and how accurate biometric authentication can identify individual person, and in the end, to help future researchers to shorten the time in conducting research or have the right authentication method for a VR service. Result of the research found that to build biometric authentication model, researcher often use k-Nearest Network and Support Vector Machine (SVM) machine learning, and finger vein and hand movement are the most accurate biometric authentication among others.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128422712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jyoti Madake, Chinmay Deotale, Geetai Charde, S. Bhatlawande
{"title":"CHESS AI: Machine learning and Minimax based Chess Engine","authors":"Jyoti Madake, Chinmay Deotale, Geetai Charde, S. Bhatlawande","doi":"10.1109/ICONAT57137.2023.10080746","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080746","url":null,"abstract":"Designing Chess Engine has been a main focus of research for a long time. The paper employs a novel combination approach of Machine learning based estimator with artificial intelligence (AI) to build chess AI. The Minimax Algorithm is a decision theory-based technique implemented for reducing the load on the chess engine’s hardware. Also, Alpha-Beta Pruning algorithm is implemented to eliminate any nodes in the search tree that aren’t essential and hence makes the AI efficient. Trained estimators achieved a high accuracy of 96.77% for calculating the probability of ‘good move’. A variable depth of search tree based on the number of legal moves has also been employed for the minimax algorithm.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"323 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124562702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shrinjoy Sen, Deep Chakraborty, Biswanil Ghosh, Bhabnashre Dutta Roy, Krittika Das, Jyoti Anand, Prof. Aniket Maiti
{"title":"Pothole Detection System Using Object Detection through Dash Cam Video Feed","authors":"Shrinjoy Sen, Deep Chakraborty, Biswanil Ghosh, Bhabnashre Dutta Roy, Krittika Das, Jyoti Anand, Prof. Aniket Maiti","doi":"10.1109/ICONAT57137.2023.10080856","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080856","url":null,"abstract":"In the present work, the possibility of preventing damage to cars and increasing the safety of cars using Image Processing has been explored. A method for modifying an image to produce a better image or to extract some relevant information from it is known as “image processing” [1]. It is a kind of signal processing where the input is an image and the output can either be another image or traits or features related to that image. We have dived deep into Machine Learning and further explored Deep Learning Techniques [2] using the custom trained CNN model. The following paper discusses the possibility of using YOLO Algorithm [3] to detect potholes and alert the driver to slow down thereby reducing possibilities of accidents. Initial Models tested used Yolov3 [4] with a small dataset of 600 images. The final model tested in this paper uses 3000 images of potholes hand clicked at angles ranging from 30 degrees to 90 degrees with respect to the ground. It further dives deep into object tracking along with the YOLOv4 algorithm [5] and implementing the deepSORT [6] algorithm. A little light is also shed on the probability of the use of ML Model to detect the most common roads used at most common timings to keep the driver well informed about all upcoming potholes and road disturbances seen previously.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Safety Helmet Detection: A Comparative Analysis Using YOLOv4, YOLOv5, and YOLOv7","authors":"Siddhi Chourasia, Rhugved Bhojane, Lokesh M. Heda","doi":"10.1109/ICONAT57137.2023.10080723","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080723","url":null,"abstract":"Safety helmets are of utmost importance to workers’ lives as the most fundamental form of protection. However, safety helmets are frequently not worn as a result of a lack of safety awareness. Utilizing outdated manual inspection techniques and video monitoring to check if employees are wearing helmets results in missed inspections and poor punctuality. As object detection technologies advanced, the YOLO family of detection algorithms, which have extremely high speed and precision, were applied in multiple detection segments. In this paper, we compare and analyze the three models of the YOLO family, the YOLOv4, the YOLOv5, and the YOLOv7 for helmet detection. A publicly available dataset of 5000 images was collected and annotated. Our results have shown that the YOLOv7 accomplishes an mAP of 96.4% which is 1.36% better than the YOLOv5 and 3.00% better than the YOLOv4. The results also show that the YOLOv7 has an average detection time of 12.4 ms, outperforming that of the YOLOv4 and the YOLOv5. Both in terms of accuracy and speed, the YOLOv7 exceeds both models, making it possible for even greater real-time object detection.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126691906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sensorless Control of a BLDC Motor using Back-EMF Detection Method","authors":"Dattatray Sawant, Y. Rao, R. Sawant","doi":"10.1109/ICONAT57137.2023.10079963","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10079963","url":null,"abstract":"Different ways of sensorless control of Brushless DC Motor (BLDC) and its merits over sensored control are discussed. Due to complexity of motor control system and high cost, sensorless control of a BLDC motor using zero crossing detection of Back-EMF is proposed in this paper. A mathematical model and MATLAB Simulink Model based on Back-EMF zero crossing detection method is also implemented. The function of the different blocks in the model have also been discussed in detail.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kamepalli Alekhya, P. Sravya, N. Naik, B. J. LakshmiNarayana
{"title":"Ambient Air Quality Monitoring System","authors":"Kamepalli Alekhya, P. Sravya, N. Naik, B. J. LakshmiNarayana","doi":"10.1109/ICONAT57137.2023.10080220","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080220","url":null,"abstract":"These days, air pollution is a major problem. For a better future and everyone’s health, Monitoring and controlling air quality are crucial. Here, we suggest an IOT-based system for live air quality monitoring that enables monitoring and evaluation of the air quality in real-time. When hazardous gases and compounds are present in the air, the system uses air sensors to continually relay data to the microcontroller. The system also continuously monitors the levels and transmits its findings via IOT to an online server. The microcontroller receives data from the sensors and processes it before sending it via the internet. When the air quality drops below a particular point, which occurs when dangerous gases including CO2, smoking, alcohol, benzene, NH3, and NOx are sufficiently prevalent in the air, an alarm will sound and an alert message will be issued. It will make it very simple to monitor air pollution because it would show the air quality in PPM on the LCD and internet. The MQ6, MQ7, MQ2, and MQ135 sensors are used by the system to monitor air quality since they can correctly measure and detect the majority of hazardous substances.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123626157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Life Cycle Analysis of Lithium-ion Batteries: An Assessment of Sustainability Impact","authors":"M. Anil, G. Rejikumar","doi":"10.1109/ICONAT57137.2023.10080437","DOIUrl":"https://doi.org/10.1109/ICONAT57137.2023.10080437","url":null,"abstract":"Energy storage systems are essential to bring down greenhouse gas emissions to the atmosphere and to mitigate climate change related damages to the environment by paving the way to integrate more variable renewable energy into the generation mix of a region or country. Greater penetration of intermittent variable renewable energy is facilitated by the presence of utility-scale battery energy storage systems at suitable locations in the grid. Lithium-ion batteries which enjoy the highest market share at present suffer from serious environmental non-sustainability issues during their life cycle and during the recycling processes; hence their use is to be curtailed to save the environment from damages caused by emissions and other toxic pollutants which detrimentally affect our air, water, and terrestrial ecosystem. This paper is an attempt to study the environmental damages of lithium-ion batteries through a life cycle analysis and suggest appropriate sustainable solutions to overcome such issues.","PeriodicalId":250587,"journal":{"name":"2023 International Conference for Advancement in Technology (ICONAT)","volume":"47 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}