E. Devi, V. Athappan, Rahul R Rajendran, E. Devi, Dr.G. Emayavaramban, S. Sriragavi, Dr.M. Sivaramkrishnan
{"title":"A Diagnostic Study on Prediction of Covid-19 by Symptoms Using Machine Learning","authors":"E. Devi, V. Athappan, Rahul R Rajendran, E. Devi, Dr.G. Emayavaramban, S. Sriragavi, Dr.M. Sivaramkrishnan","doi":"10.1109/ICEARS53579.2022.9752301","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752301","url":null,"abstract":"Effective screening helps for quick and accurate detection of COVID-19 and it also decreases the burden on the healthcare system. Prediction models with numerous criteria have been developed to estimate the probability of infection. These are designed to assist medical workers across the world in triaging victi ms, especially in places with limited medical resources. For predicting the COVID-19 using symptoms, the dataset is taken from the website of the Israeli Ministry of Health. The dataset contains 9 attributes and 2,78,848 samples. The raw dataset is cleaned using pre-processing techniques. The Machine learning algorithms like Random Forest, K Nearest Neighbor, Decision Tree, and hybrid Random Forest, K Nearest Neighbor, and Decision Tree are applied on the 1,95,194 samples to identify the model. The predicted model is tested on 83,654 samples to ensure the quality of the designed model. The performance metrics like ROC [Receiver Operating Characteristic] curve, True Positive and Negative Rate, False Positive and Negative Rate, Positive and Negative Predictive Value, and Accuracy are applied to check the model. From the evaluation result, the proposed hybrid model gives high accuracy of 98.97% . The proposed technique might be utilized to priorities COVID-19 screening when testing capabilities are constrained., among several other things.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132197328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saleem Akram P, Kanakaraja P, Naveen Mani Bhaskar Ch, Jaideep M, Shanmukh D
{"title":"An LPWAN Based Indoor & Outdoor Continuous Live Stock Monitoring System","authors":"Saleem Akram P, Kanakaraja P, Naveen Mani Bhaskar Ch, Jaideep M, Shanmukh D","doi":"10.1109/ICEARS53579.2022.9752016","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752016","url":null,"abstract":"The advancement of the Web of Things is turning out to be increasingly more popular with its first home mechanisation status. This paper covers the planning, execution, and activity of IoT equipment and programming intended for ceaseless domesticated animals observing in horse shelters and during planning. LoRa Low Power Wide Region Organisation (LPWAN) innovation is used to cover various areas, as well as the proper setup of web administrations for data storage, examination, and perception. Since LPWAN focal access controls (Macintosh) layers doesn't provide a pre-discourse listening strategy, Macintosh layer is provided with more organisation-based admittance to keep away from struggle (CSMA/CA). The framework is planned utilising off-the-rack equipment, and its presentation is additionally estimated with the assistance format. The underlying aftereffects of the utilisation of HW in the field guarantee the soundness of the anecdotal framework and its dependability.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131861230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Vijaya Saraswathi, Sk Iftequar Ahmed, M. Sriveda Reddy, S. Akshay, M. Vrushik Reddy, M. Sanjana Reddy
{"title":"An Improved Approach towards Network Security of an Organization","authors":"R. Vijaya Saraswathi, Sk Iftequar Ahmed, M. Sriveda Reddy, S. Akshay, M. Vrushik Reddy, M. Sanjana Reddy","doi":"10.1109/ICEARS53579.2022.9751998","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751998","url":null,"abstract":"More and more publicly available servers are becoming vulnerable to unauthenticated and unauthorized accesses, and intrusions are becoming much more common. As the size and number of networks and the Internet traffic expands, the requirement for intrusion detection grows, as does the need to reduce the burden associated with intrusion detection. Not only is it vital for a network/server administrator to ensure client performance, but it is also important to prevent unwanted access. The rise in the number of network threats is becoming a serious concern and detecting them is becoming increasingly more difficult. And the demand for a more advanced and logical intrusion detection system is growing at a rapid pace. The high rate of false/fake alarms is a fundamental flaw in existing systems. Honeypots can be a good way to improve the network’s overall dependability and security in this situation. Therefore, a self-improving approach towards security of the organizations can greatly help in tackling this kind of unauthorized accesses and data breaches. By the term self-improving, it means all the fixes are incorporated for the latest vulnerabilities found by using the attacker’s knowledge","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Chandra, Mohana Sundari L, N. Ashok Kumar, Ngangbam Phalguni Singh, Joshuva Arockia Dhanraj
{"title":"A Logical Data Security Establishment over Wireless Communications using Media based Steganographic Scheme","authors":"I. Chandra, Mohana Sundari L, N. Ashok Kumar, Ngangbam Phalguni Singh, Joshuva Arockia Dhanraj","doi":"10.1109/ICEARS53579.2022.9752183","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752183","url":null,"abstract":"Internet speeds and technological advancements have made individuals increasingly concerned about their personal information being compromised by criminals. There have been a slew of new steganography and data concealment methods suggested in recent years. Steganography is the art of hiding information in plain sight (text, audio, image and video). Unauthorized users now have access to steganographic analysis software, which may be used to retrieve the carrier files valuable secret information. Unfortunately, because to their inefficiency and lack of security, certain steganography techniques are readily detectable by steganalytical detectors. We present a video steganography technique based on the linear block coding concept that is safe and secure. Data is protected using a binary graphic logo but also nine uncompressed video sequences as cover data and a secret message. It's possible to enhance the security by rearranging pixels randomly in both the cover movies and the hidden message. Once the secret message has been encoded using the Hamming algorithm (7, 4) before being embedded, the message is even more secure. The XOR function will be used to add the encoded message's result to a random set of values. Once the message has been sufficiently secured, it may be inserted into the video frames of the cover. In addition, each frame's embedding region is chosen at random so that the steganography scheme's resilience can be improved. In addition, our experiments have shown that the approach has a high embedding efficiency. The video quality of stego movies is quite close to the original, with a PSNR (Pick Signal to Noise Ratio) over 51 dB. Embedding a payload of up to 90 Kbits per frame is also permissible, as long as the quality of the stego video is not noticeably degraded.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115563583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Optimized Ternary Arithmetic Logic Circuit using Carbon Nano Tube Field Effect Transistor","authors":"A. Latha, S. Murugeswaran, G. Yamuna","doi":"10.1109/ICEARS53579.2022.9752391","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752391","url":null,"abstract":"Ternary Logic Circuits have gained the crucial attention of all the semiconductor researchers as it provides better interconnect, power, performance and speed when compared to the conventional binary logics. There is a minimal area overhead in ternary logics but that’s permissible as long as other parameters provide a much beneficial results. Carbon Nano Tube (CNT) Transistors are a remarkable replacement for the conventional Complementary Metal Oxide Semiconductors (CMOS) as they exhibit better electrical connectivity, structural abilities and mechanical properties. The main focus of present-day requirements are designing and developing power optimized high speed circuits without compromising on performance and area. So, to achieve all these, this research work focus on combining both the high-profile techniques to build Low Powered Ternary Arithmetic Logic Circuits (LP- TALCs) using CNT transistors. ALCs plays the major role as the basic operating unit for any processors or circuits which helps to perform arithmetic operations and logic operations in single structure. The various logic operations performed by this TALC circuit is Buffer, Inversion, Ternary NAND, Ternary NOR, Ternary AND, Ternary OR, Ternary Adder, Ternary Subtractor and Ternary Comparator. The structure basically consists of Low Power Enabled Decoder (LPED), Functional modules and Output selection circuit (OSC). LPED circuit helps to achieve low power by enabling the selected circuit operations using decoder circuits and the inputs are fed to functional modules which consists of all the logical structure and finally the output selection circuit consists of encoders which deliver the final output function. The proposed structure is designed using 32nm CNTFET technology and the simulation results shows almost 90% power reduction to their binary counterpart and 85% Power delay product improvement.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thillai Rani M, Sam Jebastin J, Sangesh V, Shemsingh Cyrus G
{"title":"Automated Moisture Level Maintenance and Baking Process of Semiconductor Components","authors":"Thillai Rani M, Sam Jebastin J, Sangesh V, Shemsingh Cyrus G","doi":"10.1109/ICEARS53579.2022.9751916","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751916","url":null,"abstract":"Printed circuit boards (PCBs) and semiconductor electronic components are often stored in a vacuum sealed moisture barrier bag. Further moisture protection is ensured with the use of humidity indicator cards and desiccant packs. The humidity indicator cards are manually checked, and the components are subjected to hot air drying based on the moisture level. In this paper, an automated approach is proposed for this process. The moisture content in the device is measured using moisture sensor and the microcontroller will initiate baking based on its input. If it is normal level the microcontroller will be in normal state, if it reaches the threshold, representing the presence of moisture, the microcontroller will provide instructions to dry the board or de vice using a hot air-drying oven at the required temperature based on the level of moisture. This helps in extending the shelf life by removal of moisture from the semiconductor de vice and enables effective utilization in production or storage line.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"49 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of AES and RSA algorithms based on GPUs","authors":"GK Yudheksha, Prince Kumar, S. Keerthana","doi":"10.1109/ICEARS53579.2022.9752356","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752356","url":null,"abstract":"Combining the characteristics of GPUs and CPUs can greatly enhance the performance and bandwidth, though their design philosophies are inherently different. This research paper focuses on the GPU parallel computing technologies for encryption of AES and RSA algorithms. With the arrival of NVIDIA Technology’s Compute Unified Device Architecture (CUDA), the graphics processing unit (GPU) has shifted from graphics-capable devices to universal sequence streamline units. Cryptography is about the security techniques. The Advanced Encryption Standard (AES) is widely used in the file encryption, wireless security, SSL/TLS, etc. However, its execution efficiency can still be improved to provide better security. Similarly, improvements can also be made in serial implementations of the RSA algorithm. Parallel implementation of security algorithms has been shown to improve execution efficiency in comparison to serial implementation. This research paper focuses on parallel implementation of AES and RSA algorithms on GPU to enhance performance and energy efficiency in comparison to CPU","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115089545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Venkata Subbarao, G. Challa Ram, D. Girish Kumar, Sudheer Kumar Terlapu
{"title":"Brain Tumor Classification using Ensemble Classifiers","authors":"M. Venkata Subbarao, G. Challa Ram, D. Girish Kumar, Sudheer Kumar Terlapu","doi":"10.1109/ICEARS53579.2022.9752177","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752177","url":null,"abstract":"In Medical analysis and treatment the primary step is to identify the presence of tumor in brain and the effected area. In this regard, Brain Tumor (BT) classification helps the doctor to know the stage of tumor. This paper presents BT classification using a set of ensemble classifiers (EC). To train the classifier 17 redundant noise features are extracted from the MRI images. In training phase, these features are fed to variety of EC classifiers for learning. In testing phase, the trained model is used to identify the class of MRI image. Performance of proposed EC classifiers are analyzed under different training rates. Performance is analyzed for different MR image data sets under different training rates. Experimental results depicted that EC classifiers performance is superior than most of the traditional machine learning (ML) classifiers such as random forecasting, logistic regression, and naive bayes classifiers.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115094798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Key Technologies of Legal Case Management Information System Considering QoS Optimization","authors":"Wen Yuan","doi":"10.1109/ICEARS53579.2022.9751871","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751871","url":null,"abstract":"This paper conducts the development of the key technologies of the legal case management information system considering QoS optimization. The designed system administrator can carry out that the all-round management of the system, including account management, database management, security setting management, core data entry management, and data statistics management. With this help, the QoS optimization model is then integrated to improve the systematic performance of the system as the key technology. Similar to the layering in the data source, the data set is composed of the fields of the data set, and contains the relevant information of the attribute fields of various entity element categories. Furthermore, the designed system is analyzed and implemented on the public data sets to show the results.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116960263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sirak Gebrehiyot, M. Madiajagan, B. Pattanaik, E. Balamurugan, S. Selvakanmani, S. Vijayarangam
{"title":"High Sensitive IoT Nanotechnology Sensors for Improved Data Acquisition and Processing","authors":"Sirak Gebrehiyot, M. Madiajagan, B. Pattanaik, E. Balamurugan, S. Selvakanmani, S. Vijayarangam","doi":"10.1109/ICEARS53579.2022.9752333","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752333","url":null,"abstract":"Internet of Nano-Things is regarded as an extensive model for future applications that deploys an improved technical knowledge on data acquisition and classification. In this paper, we utilize the availability of gold nanoclusters in Internet of Things (IoT) sensors over a monolayer of grapheme film that tends to change with respect to the sensing properties. These IoT devices are utilized for transmit the sensing parameters to the local hub that deposits or offloads the data to cloud. The input data is then processed and classified to test the efficacy rate of the IoT sensors. The simulation is conducted on a real-time IoT nanotechnology sensor device to test the accuracy of data acquisition. The results show that the proposed model with nanotechnology IoT sensor is effective in capturing the data at a higher response and accurate rate than other methods.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123704195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}