Yesvanthkrishna V, R. B, Kracose Nishanth J, Anbarasu P, M. C
{"title":"Self-Regulating Water Management system using Programmable Logic Controller","authors":"Yesvanthkrishna V, R. B, Kracose Nishanth J, Anbarasu P, M. C","doi":"10.53759/acims/978-9914-9946-9-8_19","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_19","url":null,"abstract":"This paper presents the design and implementation of a distributed control system (DCS) for a water reservoir using programmable logic controllers (PLCs) and a human machine interface (HMI) for monitoring and control. The control system is designed to monitor the water levels, gates, and pumps in the water reservoir and to provide remote access to operators for better decision-making. The PLCs are programmed to control the gates and pumps according to the water level in the dam. The HMI provides a graphical user interface to monitor the water reservoir status and control the gates and pumps remotely. The system is tested and validated, and the results demonstrate the effectiveness and efficiency of the proposed control system.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"27 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120905512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarmila K B, Hariboobaalan P N, J. P., K. C, Kavin P
{"title":"A Study on Palmistry Analysis using Deep Learning","authors":"Sarmila K B, Hariboobaalan P N, J. P., K. C, Kavin P","doi":"10.53759/acims/978-9914-9946-9-8_10","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_10","url":null,"abstract":"Palmistry is an artifice of interpreting a person’s characteristics and predicting their future by examining the palm of their hand. It is believed by most people and used all over the world. It uses palm lines, shapes, patterns, mounts, and fingertip position as the features for interpretation. It has been used since ancient times. It is also called Chiromancy, Chirology, and Palm Reading. Even though the technology evolved and is being used in all other fields, Palmistry is a field where it is lagging behind and not yet fully implemented. Most of the research concentrates on the size, shape, color, and structure of the palm, very little concentrates on the lines and that too concentrates only on the primary lines. Here we are attempting to create a fully implemented palmistry application with the help of deep learning and image processing algorithms, to use all the features in the palm and palm lines to give complete prediction results.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121517296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Data Security in Cloud Computing","authors":"Subha R, Vaijayanth S, S. j., S. R, S. T","doi":"10.53759/acims/978-9914-9946-9-8_5","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_5","url":null,"abstract":"The objective of this project is to create a secure method of encrypting and storing data in cloud computing settings. In order to accomplish this, we compare the performance of three popular encryption algorithms—AES, DES, and MES—with various key lengths. Finding the ideal encryption technique and key length for our project is the goal of this evaluation. A secure system for encrypting and storing data in cloud computing settings is the anticipated result of this project, and it can help safeguard sensitive data from unwanted access and potential security breaches.This study can help with the future development of more effective cloud security solutions by illuminating the efficacy of various encryption approaches in protecting data in the cloud.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127763744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Circularly Polarized Metamaterial Based Fractal Wearable Antenna for Wireless Applications","authors":"Mehaboob Mujawar, Bhagyashree Goudar, Kaveri Basarakod, Aishwarya Kalal","doi":"10.53759/acims/978-9914-9946-9-8_4","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_4","url":null,"abstract":"The design of wearable fractal antenna on the spiral shaped Metamaterial (MTM) substrate suitable for Industrial, Scientific and Medical (ISM) (2.4-2.45GHz) frequency bands is presented in this paper. To reduce the SAR value a spiral metamaterial meander is introduced in the ground plane. High-Frequency Structure Simulator (HFSS) software was used to design the antenna. Maximum allowedSpecific Absorption Rate (SAR) value is 1.6 W/Kg which indicates that the wearable antennas are safe for human. Jeans substrate is used to design the antenna. The reflection coefficient of the antenna is -27 dB and the Voltage Standing Wave Ratio (VSWR) of the antenna is 1.05. The SAR value of the proposed antenna when placed on Phantom neck is 0.78 W/Kg, which makes it suitable for wearable applications.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128376385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Validation using ETL – A Theoretical Perspective","authors":"S. S, Roshaan J. S, S. V, S. S, Sreemathy J","doi":"10.53759/acims/978-9914-9946-9-8_2","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_2","url":null,"abstract":"Data is more readily available than ever, but when it is erroneous or insufficient, it can be challenging to interpret. As a result, data validation is essential to improving the quality of data for sound decision-making. The authors have discussed some of the most important concepts and challenges in data validation. It is obvious that human oversight cannot be completely removed from this process. Information priceless human qualities that cannot be taught. Humans are still cautious to take action on decisions that have not been validated by another person, despite today's highly advanced data validation technology or automated approaches. A data validation dashboard can be used by an expert data practitioner to monitor the complete data analysis procedure. The dashboard may make it easier for teams or project managers to assign tasks and resources while also more efficiently monitoring the progress and success of their work. This paper offers insightful discussions of the fundamental ideas, key points, and validation procedure for data validation and quality assurance. Additionally, the article compares several data validation technologies, and several significant industry players are explored. Additionally, the main problems, difficulties, and requirements are explored.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128479005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keerthika J, Adisvara A, Akash S, Jayanesh B, Arul Prakash T
{"title":"E-mail Spam Detection and Phishing link Detection Using Machine Learning","authors":"Keerthika J, Adisvara A, Akash S, Jayanesh B, Arul Prakash T","doi":"10.53759/acims/978-9914-9946-9-8_9","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_9","url":null,"abstract":"Phishing, which tricks individuals into revealing delicatedata like login credentials and financial details, is the most widespread type of cybercrime. Attackers typically use electronic mail, prompt messaging, and telephone calls to initiate these attacks. Despite ongoing efforts to prevent phishing attacks, current measures are not entirely effective, as the amount of phishing emails has enlarged significantly in current years. While numerous methods have been developed to filter out phishing emails, there is still a need for a comprehensive solution. This survey is the first of its kind to examine the use of N-L-P and ML methods for identifying phishing electronic mail. The analyzesof state_of_the_art N- L-P approaches that are presently being used to detect phishing electronic mail at different periods of the outbreak, with a focus on M-L methods. These methods are compared and evaluated in-depth.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126492588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Diabetes with Mobile Applications using Cloud Based Expert System","authors":"P. M, Santhoshkumar S P, Chandramohan S","doi":"10.53759/acims/978-9914-9946-9-8_15","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_15","url":null,"abstract":"The integration of expert systems, mobile intelligence, and the cloud for diabetes diagnosis was the study's main objective. An expert system is a computer programme that makes use of a knowledge base and an inference engine to resolve problems considerably more quickly and effectively than they would otherwise. To lessen the limitations of mobile applications, the cloud has provided developers with a variety of services to create, manage, and deploy. Because of population expansion, ageing, addiction, urbanization, obesity, lack of exercise, and other complex diseases, there are more people with diabetes than ever before. Furthermore, these issues are made worse by a lack of specialists, inaccurate diagnoses, and inadequate medical facilities. Thus, diabetics require ongoing care such as dietary restriction, exercise, and insulin management. A hospital's knowledge was drawn from in order to create the prototype using a purposive sampling technique. Case studies are chosen for testing and assessing the prototype system in order to determine whether or not it is accurate and meets end-user criteria.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134029204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encrypted Image Retrieval Scheme on Blockchain","authors":"Chandiya C, Dhanushya D, Harithaa G","doi":"10.53759/acims/978-9914-9946-9-8_7","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_7","url":null,"abstract":"Blockchainhas flourished in a variety of industries throughout a period known as the \"digital economy\", including finance and digital copyright. Blockchain is highlighting the storage issue more and more. In order to lessen the demand for node storage, the existing blockchain maintains block information in external storage devices. Blockchain transaction retrieval issue is brought on by the new blockchain storage approach. The issue arises when the user is required to download the decentralized blockchain ledger information from the external storage system. Since, they couldn't locate the node comprising that particular transaction, therefore which results in significant communication overhead. We take advantage of the data that is Blockchain is semi-structured for this issue and obtain the common traits of blockchain transactions like the Date and account address. Next, we create a method for retrieving blockchain transactions. Because of the absence of an effective account-specific secondary search data structure addresses, we suggest the scalable B+ tree. For encryption and decryption of Images we have used Elliptic curve Cryptography algorithm and AES algorithm. For Generating Hash value we have used ECDSA Algorithm.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129515012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Niranjani V, Premkumar Duraisamy, Priyadharshan M, Gayathri B
{"title":"Advancements in Machine Learning Techniques for Optimizing Cognitive Radio Networks: A Comprehensive Review","authors":"Niranjani V, Premkumar Duraisamy, Priyadharshan M, Gayathri B","doi":"10.53759/acims/978-9914-9946-9-8_20","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_20","url":null,"abstract":"Machine learning (ML) techniques have gained significant attention in the field of cognitive radio networks (CRNs) due to their ability to learn and adapt to changing environments. In CRNs, ML algorithms can be used for various tasks such as spectrum sensing, spectrum allocation, power control, and cognitive routing. This literature survey provides an overview of the state-of-the-art machine learning approaches for CRNs, including reinforcement learning, deep learning, decision trees, and genetic algorithms. The potential applications of these approaches, as well as the challenges and opportunities for future research, are also discussed. The survey can serve as a valuable resource for researchers and practitioners interested in applying machine learning in CRNs.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114142968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. S, Venkata Sai Vaishnavi K, S. B, Vijitha B, Vineela Reddy B
{"title":"A New Approach of Machine Learning and Deep Learning Algorithms Based Crop Yield Prediction","authors":"S. S, Venkata Sai Vaishnavi K, S. B, Vijitha B, Vineela Reddy B","doi":"10.53759/acims/978-9914-9946-9-8_18","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_18","url":null,"abstract":"The science and skill of nurturing plants and wildlife are referred to as agriculture. India ranks second in the world for farming, which takes up 60.45% of the country's territory. The economy of India is primarily supporting agricultural, agro-industrial sectors. Crop rotation, the consistency of the soil, air and surface temperatures, precipitation, and other elements all have an impact on how well crops are grown. Further crucial are soil constituents including nitrogen, phosphate, and potassium. The corpus of work currently being done in this field includes a crop choice model that makes use of ML methods (Random Forest, Decision Tree, ANN). In this paper, recommended model enhanced using Deep Learning techniques, in addition to crop prediction, precise data on the amounts of necessary soil components and their individual prices are attained. Compared to the present model, it provides a better degree of accuracy. In order to help farmers to predict a profitable crop, analyses the available data. Variables related to the soil and climate taken into consideration to anticipate an acceptable yield. This objective show’s that Python-Based System using cunning strategies for predicting, bountiful harvest possible while using the least amount of resources. In this work, the SVM machine learning algorithm is combined with the LSTM and RNN deep learning algorithms.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121235630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}