{"title":"The Memorable Assistant: An IoT-Based Smart Wearable Alzheimer’s Assisting Device","authors":"S. Siri, H. B. Divyashree, S. P. Mala","doi":"10.1109/CSITSS54238.2021.9682788","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9682788","url":null,"abstract":"In our world, communication and data create a most important combination. It can be credited to IoT, for being one of the most powerful bridges to have created this combination. With the progression of humankind, technological developments strive to bring automation into everyday life. It is headed to understand and control the objects around us in a manner desirable to us. It improves the Quality of Life in every sector, to name a few, healthcare at hospitals and homes, manufacturing industries, home automation, etc. IoT has driven research in healthcare to make it more affordable and accessible to everyone. Our solution keeps in mind the importance of these attributes in healthcare and brings forward a cost-effective, efficient, portable and user-friendly smart wearable device paired with a software mobile application to track, monitor, alert and assist patients suffering from Alzheimer’s. The results derived from this IoT based healthcare system can be considered as one of the most promising solutions to help patients and their caregivers, as it creates a two-sided channel of communication between them as it is built using Node MCU and provides analytics using Cloud based platforms","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114459189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khushi Kumari Jha, Roshan Jha, Ankita Kumari Jha, Md Al Mahedi Hassan, Saurav Yadav, T. Mahesh
{"title":"A Brief Comparison On Machine Learning Algorithms Based On Various Applications: A Comprehensive Survey","authors":"Khushi Kumari Jha, Roshan Jha, Ankita Kumari Jha, Md Al Mahedi Hassan, Saurav Yadav, T. Mahesh","doi":"10.1109/CSITSS54238.2021.9683524","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683524","url":null,"abstract":"Machine learning(ML) is basically an area of Artificial Intelligence(AI) that has been a cornerstone of digitalization solutions that have sparked significant interest in the virtual world. This paper provides a quick overview of the most often used machine learning methods. Also presents a brief comparison of ML algorithms based on various applications, as well as a thorough survey of ML algorithms. This paper intends to highlight the categorization (such as Supervised learning, Unsupervised learning, Semi-supervised learning and Reinforcement learning), challenges and real-world applications of machine learning algorithms from an application standpoint in order to aid in making an informed decision towards selecting the appropriate learning algorithm to meet the specific requirements of the application.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116018168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Security Challenges and Issues in IoT Enabled Smart Homes","authors":"R. Sivapriyan, S. Sushmitha, K. Pooja, N. Sakshi","doi":"10.1109/CSITSS54238.2021.9683324","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683324","url":null,"abstract":"In recent years, IoT technology and its applications have played a significant role in controlling many appliances with ease of comfort by using our smartphones. One of the primary concerns nowadays is ‘Security,’ where some of the attacks are prone to Physical and Cyberattacks that aim hackers to hack confidential data from unauthorized networks. It is due to weak password protection, lack of encryption, and lack of user awareness about IoT applications. This paper discusses the security threats and challenges within IoT-based Smart Homes. It also presents a brief overview of IoT architecture and its applications. By considering some of the appropriate measures to implement a security management system, prevailing to different layers highlights the security concepts and challenges in IoT-based systems. It paves the way for the revolutionary change in people’s lifestyles for a better future. This paper also discusses some countermeasures to overcome risks/threats in real-life scenarios, which awakens the users to follow specific measures by taking precautions or suitable actions to new challenges and computing capabilities in IoT-based Smart Home systems.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122076921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. S. Swarnalatha, Priyojit Paul, Dipankar Suryansh, Akanksha, Akanksha Manish, Sakshi Singh, Samriddhi Jain
{"title":"Spam Detection in Twitter Data","authors":"K. S. Swarnalatha, Priyojit Paul, Dipankar Suryansh, Akanksha, Akanksha Manish, Sakshi Singh, Samriddhi Jain","doi":"10.1109/CSITSS54238.2021.9683387","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683387","url":null,"abstract":"Among all of an existing social media sites Twitter has grown to be the most admired by the internet users as it has changed the way of information exchange in recent years. But, as its popularity has spiked, spammers have emerged as one of twitter’s biggest limitations finding it easily accessible for attacking the trending topics to spoil useful content, generate traffic and revenue. They increase privacy concerns of the users by attacking their personal information. According to Twitter it mostly uses detection and blocking of spam creating accounts as a mechanism for dealing with spam issues. However, spammers always have the option of creating new accounts. So, there is a need of spam detection rather than detecting the accounts. Twitter is currently using Google Safe Browsing for the purpose of detecting and blocking of spam links but they are not proving to be much useful. In this paper we introduce bodywork that considers user based, tweet-based features and tweet text features. Then we use different machine learning algorithms. Our framework gives 95.695% accuracy with Naive Bayes algorithm.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117108668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. S. Nikhil Kumar, G. C. Akshatha, Manthan D Bangre, M. Dhanush, C. Abhishek
{"title":"Decentralized used cars Bidding application using Ethereum","authors":"M. S. Nikhil Kumar, G. C. Akshatha, Manthan D Bangre, M. Dhanush, C. Abhishek","doi":"10.1109/CSITSS54238.2021.9682892","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9682892","url":null,"abstract":"Blockchain technology is used to decentralize ledger to keep transaction records. The record of transactions is persistent in a peer-to-peer network. This eliminates central authority needed to confirm the transactions. The participants verify the transactions in peer-to-peer networks. The need for any central authority for any kind of trade settlement, voting, or money transactions is nullified. Blockchain technology has been revolutionizing Information Technology (IT) for the past few years. It is being used in supply chain, health sector, Internet of Things, asset management, banking sector, payments and many more. Blockchain allows decentralization, transparency, security and increased efficiency in the applications. With the increasing awareness of cryptocurrency, the significance of blockchain is obtaining its popularity across the globe.Cars being the most popular mode of transport used by the majority of the population across the globe. Because of the increasing prices of new cars, the popularity of used cars (second hand cars) has increased exponentially over all these years. Identifying this opportunity in the used cars segment, we propose an application that uses blockchain to connect buyers and sellers. By implementing decentralization, we aim to solve security related issues in existing centralized applications. We have implemented an e-auction methodology on top of Ethereum Blockchain. The proposed application allows bidders to directly bid the products over the Internet. The blockchain technology with low transaction cost is used to develop the smart contract of public bid and sealed bid.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122237379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Vani, K. S. Swarnalatha, B. Chetan, Arbind Mahato, Sylvia Sauden, Gautham S Kamath, J. Martis
{"title":"Real Time Cardiac Diagnosis for Arrhythmia Using Machine Learning and IOT","authors":"E. Vani, K. S. Swarnalatha, B. Chetan, Arbind Mahato, Sylvia Sauden, Gautham S Kamath, J. Martis","doi":"10.1109/CSITSS54238.2021.9682881","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9682881","url":null,"abstract":"Cardiac arrhythmia is a perilous infection that leads to extreme medical issues in people. An ideal analysis of arrhythmia can be valuable in preventing deaths due to cardiac conditions. Through persistent, automated, and noninvasive diagnosis of cardiac arrhythmia illnesses, the Internet of Things (IoT) aims to revolutionize the medical care industry. A system to predict cardiac arrhythmia using an IoT device which reads the ECG signal, analyses it, and informs the physician in the event of an emergency. The aim of the proposed project is to build an IoT -empowered ECG reading device to extract the ECG signal. ECG signal is examined using Pan Tompkins Q R S detection algorithm to acquire its unique features. The features are then used to classify the cardiac arrhythmia illness in the classification method. Even at home, users may monitor their cardiovascular health by using an ECG signal. The system is small; thus, it requires less support and is less expensive to run. It is beneficial for the doctor to be able to assess the heart condition as quickly and precisely as possible.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Rahul, Merin Meleet, G. Srinivasan, Nagaraj G Cholli
{"title":"Clinical Data Analysis For Recognizing Named Entities","authors":"C. Rahul, Merin Meleet, G. Srinivasan, Nagaraj G Cholli","doi":"10.1109/CSITSS54238.2021.9683039","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683039","url":null,"abstract":"Ever since the introduction of the internet the amount of digital media and documents available easily has grown rapidly. Even though the digital data may be any language and format it does not change the fact that processing such data needs time and effort. This is true especially in the medical field where reports are constantly generated in huge amounts. Recent innovations in a field called as NLP and with the introduction of several efficient language models to analyze such data like BERT shows that the decrease in time to process and analyze such tasks once they are trained. One such approach that is proposed aims at recognizing entities for every word that are present in a clinical text by assigning appropriate IOB tags that indicate the position of the word or tokens and also the proteins and cell types of the clinical entities in the text data chunk by utilizing a BERT model. The results demonstrate that the labels are assigned to every word present in the clinical text. And by obtaining the metrics results that are calculated after every epoch where it is noticed that the validation accuracy and F1 score increases after every epoch. Hence for a BERT model it is concluded that with the increase in training period of the model the efficiency also increases.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114741068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Deekshitha, Rakshitha Shankar, C. Shantala, L. Girish
{"title":"Sentimental Analysis On Covid-19 Tweets using Bidirectional Encoder Representations Transformers","authors":"J. Deekshitha, Rakshitha Shankar, C. Shantala, L. Girish","doi":"10.1109/CSITSS54238.2021.9683648","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683648","url":null,"abstract":"The Coronavirus epidemic has wreaked havoc on countries all over the world. People from all over the Globe have flocked to social network to voice their thoughts and feelings about the situation that has reached epidemic proportions. The need of this paper is to exemplify how social media users feel about COVID-19 in an extremely brief span of time, Twitter saw an unusual surge in tweets on the new Coronavirus. This study presents a global Sentiment Analysis of tweets related to COVID-19, as well as how people’s sentiment in multiple nations has varied. The research study focuses on a period of time from march 2020 to april 2020. In the Sentiment Analysis, we fed dataset to different algorithms and estimate the best performance among them. As in secondly we also found the reliability on BERT model. Comparatively, BERT gave foremost accuracy amidst all. Besides, the accuracy of mentioned algorithms are well represented.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121575493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankit Vishnoi, Alok Agarwal, A. Prasad, M. Prateek
{"title":"Use of Homomorphic Transform in Encryption","authors":"Ankit Vishnoi, Alok Agarwal, A. Prasad, M. Prateek","doi":"10.1109/CSITSS54238.2021.9683207","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683207","url":null,"abstract":"Data security is an important aspect for datasets of every size and type. Data security refers to provide a secure environment to datasets, web-based datasets, and preventing unauthorized access to the data. The key data security technique is encryption, where the digital data is encrypted. As result, the unauthorized person or hacker gets unreadable data. The computing process generates data that is encrypted by the key and can be decrypted with the correct key only. In this research, an approach is proposed of using transforms to provide a better cryptography process to secure data even during communication. The result of the proposed method indicates that in any condition, the ciphertext will always be the same for each input, but the encryption key will change each time, which makes this encryption complex to break.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sai Surya Pavan Gannamani, P. Srivani, S. Adarsh, V. Shashank, M. Bharath Shreya
{"title":"Tree Age Predictor Using Augmented Reality and Image Processing Techniques","authors":"Sai Surya Pavan Gannamani, P. Srivani, S. Adarsh, V. Shashank, M. Bharath Shreya","doi":"10.1109/CSITSS54238.2021.9683736","DOIUrl":"https://doi.org/10.1109/CSITSS54238.2021.9683736","url":null,"abstract":"Tree age predictor is an idea which arose due to the usefulness in knowing the age of the trees and the disadvantages in the current methods in determining the age of the tree. Cutting of trees leads to deforestation which is very bad to the environment and is one of the root causes to the problems arising related to climate change, global warming and ecological effects. Hence, we can reduce this deforestation up to some extent by reducing the wastage and unnecessary cutting of trees. The idea is to build an application which measures the diameter of the tree using the augmented reality(AR) toolkit created by Google, then we decipher the species of the tree using recognition machine learning(ML) models, with this acquired data and some internal calculations we predict the age of the tree. Traditionally people cut trees in half to predict the age by counting the internal rings or they use an instrument called an increment borer to extract the core for the tree which involves serious physical work. Hence, due to these certain difficulties the idea to build an application serves to be a better idea to avoid unnecessary deforestation and also physical work serving an efficient and eco-friendly manner to predict the age of a tree.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131375804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}