Lenny Giovanna Herrera Sandoval, W. Auccahuasi, Sandra Paola Tello Peramas, Juan José Tello Peramas, Francisco Hilario, Ilich Ivan Pumacayo Palomino, Lucas Herrera
{"title":"Use of Virtual Tools to Develop Reading Animation and Comprehension Through Gamification for Learning","authors":"Lenny Giovanna Herrera Sandoval, W. Auccahuasi, Sandra Paola Tello Peramas, Juan José Tello Peramas, Francisco Hilario, Ilich Ivan Pumacayo Palomino, Lucas Herrera","doi":"10.1109/ICPS55917.2022.00028","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00028","url":null,"abstract":"This literature review article compiles information from the most relevant studies on the use of strategies to encourage reading, reading comprehension, and gamification for learning through virtual tools, applied to the initial level II cycle. In addition, the perspective of the mentioned authors led to suggest that the use of virtual tools in recent times has been of great help because it has motivated students to read and research more about a particular topic and this has allowed students to learn better and in a more fun and interesting way. Likewise, the bibliographic review was accompanied by a systematic search in the databases of Scopus, EBSCO, ProQuest, among others, which made it possible to identify the most outstanding authors for this study, for which they went through a meticulous filter respecting the PRISMA flowchart. On the other hand, we began with 165 studies and after a detailed systematization, 29 studies were selected that met specific characteristics and factors for this study. Likewise, a series of criteria that can help us to evaluate the quality of a literature review article by applying the descriptive method is pointed out.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116450976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shobanaboina Sai Pranup, Adarsh P Nair, Akash Kumar, Pillala Venu Dhana Kumar, Sakshi Takkar, Manik Rakhra, S. Aggarwal
{"title":"Online Jewelry Application for Predicting users Buying Habits","authors":"Shobanaboina Sai Pranup, Adarsh P Nair, Akash Kumar, Pillala Venu Dhana Kumar, Sakshi Takkar, Manik Rakhra, S. Aggarwal","doi":"10.1109/ICPS55917.2022.00042","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00042","url":null,"abstract":"The proliferation of Internet use, along with systematic advances in information technology, have transformed the way products are bought and sold, leading to an exponential growth in the number of online shoppers. However, there are many differences when it comes to online shopping. arise due to the different characteristics of consumers and the types of products and services offered. Therefore, it is crucial for both administrators and consumers to understand who consumers are and why they choose to use the Internet as a sales channel to use or avoid e-commerce and for consumer theorists. The study aimed to examine the personal factors and customer behaviours associated with the decision to purchase jewellery and to recommend the possible incorporation of online marketing to increase the entrepreneur's sales performance, an online jewellery system is designed based on react frontend framework user interface and an ultimate database using firebase database through PHP framework, which can handle larger amount of information. Not only can the system effectively help managers to enter jewellery information, but also provides online jewellery shopping to meet customer needs by desired customization of the ornaments and a genuine purity check while door delivery to fabricate the trust in between. Because of the fast and convenient access to the network, the management and sale of jewellery through the network has been widely used in many industries.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122274103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clickbait Detection Using Long short-term memory","authors":"Aromal A Balan, Anoop P, AS Mahesh","doi":"10.1109/icps55917.2022.00037","DOIUrl":"https://doi.org/10.1109/icps55917.2022.00037","url":null,"abstract":"The exploitation of clickbait has lately risen on many social media sites. Click bait is catchy titles or headlines with the primary goal of attracting attention and encouraging visitors to \"click\" on a headline. Media Clickbait is widely utilized, and detecting it is a critical step. This research presents a technique for detecting clickbait headlines on social media that employs a deep learning algorithm, especially a form of Recurrent Neural Network known as Long short-term memory. The method used focuses on textual characteristics, takes word sequence context into account, and derives colloquial expressions from the complete dataset. The headlines are vectorized using Word2vec Word embedding. Our conclusions were quite accurate, with a 96 percent accuracy rate, this is significantly more than conventional Machine Learning algorithms. A comparison utilizing the Naive Bayes classifier, a classification technique, was also performed.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133310277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Imperious Verdict for The Recognition of Vehicles Number-Plate Using an Innovative Methodology","authors":"Adarsh Sunil, Antony Samuel, Prasannakumar C V","doi":"10.1109/ICPS55917.2022.00016","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00016","url":null,"abstract":"Non-standardized number plates are prevalent in India’s present traffic patterns. Vehicle number fixed-plates should be perceived and systematised for a great number of reasons. Authorities have a tough time identifying and tracking down a specific car. In a growing nation like India, setting higher restraints on the effectiveness of any licence plate identification and recognition algorithm is impossible. The major goal of this study is to develop a method for detecting and identifying India’s transitional vehicle licence plates. Using single or multiple state-of-the-art automation, including machine-learning models, the character identification efficiency of drawn and printed plates in diverse styles and fonts improved dramatically. From a range of licence plate data, the proposed technique can develop rich feature representations. To find the licence plate in the appropriate location, the input image is first preprocessed to decrease noise and increase clarity, then separated into appropriate-sized grid cells. After the YOLOV5 has been trained, the licence plate characters should be appropriately divided. The three-character recognition systems OCR, LSTM, and STR are compared and contrasted in this study, with the conclusion that STR is the most accurate of the three. Finally, the data is post-processed, and the proposed model’s accuracy is tested against industry benchmarks. Vehicle monitoring, parking fee collection, detection of automobiles violating speed limits, reducing traffic accidents, and identifying unregistered vehicles are all expected to benefit from the proposed system. The results reveal that the suggested method achieves plate detection and character recognition accuracy levels above 90 percentage.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115299393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mostafa Al-Amin, Mirza Akhi Khatun, Mohammed Nasir Uddin
{"title":"Development of Cyber Attack Model for Private Network","authors":"Mostafa Al-Amin, Mirza Akhi Khatun, Mohammed Nasir Uddin","doi":"10.1109/ICPS55917.2022.00046","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00046","url":null,"abstract":"Cyber Attack is the most challenging issue all over the world. Nowadays, Cyber-attacks are increasing on digital systems and organizations. Innovation and utilization of new digital technology, infrastructure, connectivity, and dependency on digital strategies are transforming day by day. The cyber threat scope has extended significantly. Currently, attackers are becoming more sophisticated, well-organized, and professional in generating malware programs in Python, C Programming, C++ Programming, Java, SQL, PHP, JavaScript, Ruby etc. Accurate attack modeling techniques provide cyber-attack planning, which can be applied quickly during a different ongoing cyber-attack. This paper aims to create a new cyber-attack model that will extend the existing model, which provides a better understanding of the network’s vulnerabilities.Moreover, It helps protect the company or private network infrastructure from future cyber-attacks. The final goal is to handle cyber-attacks efficacious manner using attack modeling techniques. Nowadays, many organizations, companies, authorities, industries, and individuals have faced cybercrime. To execute attacks using our model where honeypot, the firewall, DMZ and any other security are available in any environment.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129322193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Progress of Nursing Informatics for Mental Health Initiatives","authors":"A. Alenezi, A. Alghamdi","doi":"10.1109/ICPS55917.2022.00036","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00036","url":null,"abstract":"While there is significant evidence linking information technology (IT) to enhanced safety of patients, quality of care, availability, and effectiveness, nursing staff must clearly show computer, information systems, and digital skills capabilities in order to utilise IT for practise, training, as well as research. The nurse practitioner has developed IT skills and knowledge for all stages of nurses, both novice and veteran. In addition, latest approved standards eloquent role-specific anticipations for advanced training. Regrettably, there is major worry that several nurses may lack these skills and that professional nurses are unprepared to instruct them. Often these students and faculty have newbie levels of skill, according to IT competency assessments that have primarily concentrated on nursing curriculum. Various researches, primarily in nursing education, have found that only focused interventions result in significant improvements in IT capabilities. This study contains medical and mental health nursing staff with a refresh on the literary works on IT capabilities, recent technological progress to establish and inventions, and their repercussions for the area of expertise. The mental health care that are now available are inextricably connected to the innovation that has been available to us for years of research and practise. Web, smartphone, sensor, as well as informatics technical advances can do more than just improve existing support systems. New technologies may further assist us better comprehend the information about mental disorder and challenge our underlying assumptions about the configuration, limitations, and modes of psychiatric treatment.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131994222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Auccahuasi, Lucas Herrera, K. Rojas, E. Felix, Esteban Medina Rafaile, Jorge Figueroa Revilla, Ana Barrera Loza, Z. Ayvar, Sandra Meza, Moisés Tongo, C. Ovalle, Hernando Martín Campos Martinez
{"title":"Low Cost System on IOT Technology, for remote control of Biomedical Equipment","authors":"W. Auccahuasi, Lucas Herrera, K. Rojas, E. Felix, Esteban Medina Rafaile, Jorge Figueroa Revilla, Ana Barrera Loza, Z. Ayvar, Sandra Meza, Moisés Tongo, C. Ovalle, Hernando Martín Campos Martinez","doi":"10.1109/ICPS55917.2022.00019","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00019","url":null,"abstract":"The effects of the pandemic produced by COVID-19 have caused many changes in the protocols of care and operation of medical equipment, due to the need to be able to have less contact with the patient, while ensuring patient care, In the present work, a solution is implemented to be able to control medical equipment remotely, avoiding contact with patients to a minimum, the proposed methodology makes use of a power outlet that has the ability to connect to a wireless network and thus allow the on and off by means of an application installed on any mobile device, the results demonstrate the applicability in various equipment, as well as being able to work in many connections, each equipment connected to a specific power outlet. One of the necessary recommendations is security in the wireless network, because no unauthorized user can access the network and be able to connect, in this way you have to have a specific wireless network for the use of these devices, the proposal is Applicable and scalable according to the needs and uses that may be given to it.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126737746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimum investigation and priority ranking of hazards in aviation maintenance","authors":"S. Rana, Kavya S. Nair, Paul Russel U S, V. M","doi":"10.1109/ICPS55917.2022.00040","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00040","url":null,"abstract":"With advancement in technology, safety and reliability of aircraft and aviation industry as a whole has progressed tremendously over time. A significant area in the aviation field which still has prominent human factor involvement is aviation maintenance. With high degree of human involvement in the aviation maintenance field, it stands as an area that needs to be focused heavily in the upcoming times to improve aviation safety. Human factors in this field should be studied thoroughly and hazards should be identified and analyzed so as to take appropriate precautionary measures. In this work, relevant literatures pertaining to aviation maintenance hazards are studied and major hazards and their sources are listed. Using past data as a benchmark, further questionnaires pertaining to hazards are formulated and study is done. Since assimilating a large amount of collected data becomes difficult qualitatively, a quantitative framework is integrated to aviation maintenance hazard study. Here, modified FMECA framework is integrated with MCDM for the purpose of quantitative study. AHP, a common MCDM for ranking purpose and DEMTEL, a common MCDM method for calculating interdependencies are used. The study will identify, analyze and rank all the hazards relevant in aviation maintenance and also establish the interdependencies of hazards among each other","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128508263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bank Loan Default Prediction Using Ensemble Machine Learning Algorithm","authors":"Aman Soni, K. Shankar","doi":"10.1109/ICPS55917.2022.00039","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00039","url":null,"abstract":"Banks play an integral role in the financial system of any country which directly affects its economic status and growth. The major roles of banks include accepting deposits from its customers, using those deposits to lend money to the borrowers in return for some interest, granting credits, discounting on bills etc. But the main source of profit for the banks is the interest it receives from lending money to the borrowers. And in a scenario of global pandemic like Covid-19, the number of people requiring financial aid from the banks has increased drastically. But a major problem faced by these banks is the failure of timely loan repayment by the borrowers. So, to tackle this problem, banks now a days use some models to predict the possibility of loan repayment from the borrower. Factors like annual income, employment status, home ownership, current debt etc are taken into consideration to categorize the loan request as bad loan or not. So, this paper basically aims to develop a similar model, but using ensemble machine learning algorithm of Random Forest Classification. And perform a comparative analysis with the model (Decision Tree Classification) that are currently in use. After complete implementation of all the models it was concluded that Random Forest Classifier Outperformed Decision Tree Classifier in terms of accuracy.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126024346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning based DDoS Attack Detection in Emerging Networks","authors":"M. Saravanan, S. Sushmitha","doi":"10.1109/ICPS55917.2022.00044","DOIUrl":"https://doi.org/10.1109/ICPS55917.2022.00044","url":null,"abstract":"Deep Learning (DL) is a compelling method for distinguishing botnet assaults. Nonetheless, how much organization traffic information and the necessary memory space are normally enormous. Hence, it is inordinately difficult to utilize the DL technique on memory-limited IoT gadgets. In this paper, we lessen the size of the IoT network traffic information highlight utilizing the Long Short-Term Memory Autoencoder (LAE) codec segment. To order network traffic tests accurately, we examine long haul factors connected with low-layered include created by LAE utilizing Bi-directional Long Short-Term Memory (BLSTM). The outcomes show that LAE altogether diminished the memory space expected for information capacity of huge organization traffic by 91.89%, and surpassed the standard highlights of decreasing element. Regardless of the huge decrease in highlight size, the deep Bi-directional Long Short-Term Memory model shows strength against low model value and over balance. It additionally secures a decent capacity to adjust to the states of parallel arrangement.","PeriodicalId":263404,"journal":{"name":"2022 Second International Conference on Interdisciplinary Cyber Physical Systems (ICPS)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132429920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}