{"title":"Investigating the Accuracy and Performance Enhancement in Metaverse","authors":"Himangi Verma, M. Singla","doi":"10.1109/IC3I56241.2022.10072768","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072768","url":null,"abstract":"People may use computer-generated digital representations known as “avatars” to communicate with one another and interact with digital things in the metaverse. Avatars can also be used to explore the metaverse. Imagine a combination of fully immersive virtual reality, a web-based performance game, and the World Wide Web. The use of cryptocurrency is no longer a choice but rather an integral component of modern life. Because of the decentralized nature of cryptocurrency by design, it is well suited for use as a medium of exchange in this quickly developing hybrid context. Problem with previous research work is real work implication, space consumption and limited scope. In addition to this, the mechanisms for data compression and data security are necessary. Compression is yet another area that is making strides toward improvement on a regular basis and is a hotbed for innovation. Concerns of data compression and security are also investigated in this research, which focuses on the metaverse. In addition, the performance of object identification has been improved by the implementation of an image processing mechanism to cut down on its size prior to the training and testing of the deep learning model. Result and discussion is presenting that error rate and time consumption of proposed work is less and accuracy is more than that of conventional approach.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125969659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ullagadi Maheshwari, B. Kiranmayee, Chalumuru Suresh
{"title":"Diagnose Colon and Lung Cancer Histopathological Images Using Pre-Trained Machine Learning Model","authors":"Ullagadi Maheshwari, B. Kiranmayee, Chalumuru Suresh","doi":"10.1109/IC3I56241.2022.10073184","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073184","url":null,"abstract":"Lung cancers and colon cancers are two of the leading causes of morbidity and mortality in human being. One of the essential elements to determining the type of cancer is the histopathological diagnosis. One of the most hazardous and severe diseases that people experience worldwide is colon and lung cancer, which has spread to become a common medical issue. It is very important to make a reliable and early discovery in order to reduce the danger of death. The difficulty of the task ultimately depends on the histopathologists’ experience. Recent times have seen a rise in the popularity of deep learning, which is now appreciated in the interpretation of medical imaging. As a result, artificial intelligence will soon become a useful technology. In order to identify lung cancers and colon cancer using histopathological pictures and more effective augmentation strategies, this research aims to utilize and modify the current pre-trained Convolutional Neural Network (CNN) based model. From the LC25000 dataset, the results were obtained. Precision, recall, f1score, and accuracy are all used to estimate the model performances. The findings show that the pre-trained and improved pre-trained models produced impressive outcomes ranging from 93% to 97% accuracy.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129760972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep learning for the detection of fraudulent credit card activity","authors":"Rishabh Saxena, Dalwinder Singh, Manik Rakhra, Shivali Dwivedi, Ashutosh Kumar Singh","doi":"10.1109/IC3I56241.2022.10072543","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072543","url":null,"abstract":"As the world is forwarding to new technology’s innovation and research. for one keeping their privacy defended is the most rock-hard task in the current scenario’s privacy breach is common in which offensive and unauthorized access by a third party is committed in order to steal the confidential information which termed in cyber security attack as spyware. such of the massive and worldwide problems can be tackled with the help of deep learning this research paper will demonstrate in modelling of data set using deep learning. This study intends to distinguish between legitimate and fraudulent financial dealings by employing a variety of deep learning techniques, including the convolutional neural network (CNN) and the long short-term memory (LSTM), both of which are utilised to make accurate predictions regarding financial dealings. As far as we will analyze and pre-process the data set and compare both CNN and LSTM with each other in order to find the optimal solution.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128193048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manikanda Rajagopal, P. Hinge, Kolachina Srinivas, Manesh R. Palav, P. Balaji, I. Muda
{"title":"Artificial Intelligence & Data Warehouse Regional Human Resource Management Decision Support System","authors":"Manikanda Rajagopal, P. Hinge, Kolachina Srinivas, Manesh R. Palav, P. Balaji, I. Muda","doi":"10.1109/IC3I56241.2022.10073122","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073122","url":null,"abstract":"High-quality data is utilized to make informed decisions that effectively help to successfully safeguard our environment. When there is an abundance of information that is both heterogeneous in nature (coming from a wide variety of fields or sources) and of unknown quality, various problems may occur. Furthermore, the problem’s dynamic nature also imposes some other complications. In order to deal with such complications, the central role played by supercomputers in the modern environment is to promote protection initiatives like monitoring, data analysis, communication, and information storage and retrieval. In current days, the higher dependency on the data management process forced the developers to integrate and enhance all these initiatives with Artificial Intelligence knowledge-based techniques so that smart systems can be utilized by a vast number of people. In this context, this study has illustrated how Artificial Intelligence methods have changed the nature of Environmental Decision Support Systems (EDSS) over the course of the last two decades. The strengths that an EDSS should exhibit have been emphasized in this review. In the final section, we look at some of the more innovative solutions used for various environmental issues.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128592517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sakshi Sandeep Phatak, Harshvardhan Sangram Patil, Muhammad Waqas Arshad, B. Jitkar, Sangram A. Patil, Jaydeep Patil
{"title":"Advanced Face Detection using Machine Learning And AI-based Algorithm","authors":"Sakshi Sandeep Phatak, Harshvardhan Sangram Patil, Muhammad Waqas Arshad, B. Jitkar, Sangram A. Patil, Jaydeep Patil","doi":"10.1109/IC3I56241.2022.10072527","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072527","url":null,"abstract":"In this study, the analysis of the research that has been provided in the “Advanced Face Detection using Machine Learning And AI-based algorithms”. It is a facial acknowledgment framework that utilizes AI and Machine learning. It specifically uses the Support Vector Machine (SVM) system. Modern-day technology is making people amazed with the innovations that it is providing to make an individual’s life simpler and easier. In the case of Face Recognition, it has proven to be the least intrusive and also the fastest form of the biometric verification system. Among all the tasks that can be done with the help of machine learning algorithms, one of the most crucial computer vision tasks is the use of face detection and recognition. The face detection and the recognition systems are both related to each other yet they are also very different from one another as well. By using machine learning the face detection aspect is used and it also is a widespread aspect of the face recognition system. Machine learning applies various algorithms for the detection of faces and the recognition process as well. Face detection and recognition systems are used in medical diagnosis and also in the deep analysis of human faces in the video for various intelligence purposes. Face recognition is a sub-category system of the biometric software system, it is used to map an individual’s facial features and also to store that data as a face print for future purposes.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127416597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Low Profile 28GHz mmWave Dome-Shaped 2-Port MIMO Antenna Characterized on Neltec NY9233 Low Permittivity Substrate","authors":"Vaishali Kikan, Ashwani Kumar","doi":"10.1109/IC3I56241.2022.10073333","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073333","url":null,"abstract":"This research sets an objective for mmWave28 GHz MIMO antenna fabricated on Neltec NY9233 Microwave-substrate. The antenna is designed in two configurations, firstly single-element with dimension $14.00mm times 6.50mm$ and then transformed to two-port configuration. The radiating patch which is dome shaped is printed on top-plane of the substrate and to obtain narrow bandwidth, the complete ground is printed on opposite plane of the substrate. This achieves narrow-bandwidth of 27.06GHz-28.85GHz with highest matching of impedance at 28.0GHz(47+j2.50)$Omega$ and is applicable for information and communication technologies and easily integrated within smart-phone motherboards. The electromagnetic energy radiated in air medium achieves maximum gain of 5.33dBi with maximum radiation efficiency of 92% centered at 28.0GHz and also includes stable radiation patterns. The diversity-performance corresponds to$ECC_{28GHz}lt 0.040, DG_{38GHz}gt 9.99998, TARC_{38GHz}lt -32.72dB$ and $CCL_{38GHz}lt 0.35b/s/Hz$.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127197257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Analysis of Ultrasound Image Processing Methods","authors":"Vaibhav Pandilwar, Manik Rakhra, Sanket Deshmukh, Ashutosh Kumar Singh, Dalwinder Singh","doi":"10.1109/IC3I56241.2022.10072612","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072612","url":null,"abstract":"The medical pictures that are utilized for medical purposes include things like ultrasounds, which provide such images. The ultrasound scans displayed a variety of approaches that may be utilized for the calcification of breast cancer. The calcification of breast cancer is analyzed with the help of the ultrasound pictures. A number of processes, such as pre-processing, segmentation, feature extraction, and masking, are included in the breast cancer calcification method. The cancerous part of the input picture will be hidden when the calcification procedure is applied. The findings will be examined using criteria such as recall, accuracy, and precision.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127254584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automation Intercession: Cyber Security","authors":"Samta Kathuria, Poonam Rawat, Rajesh Singh, A. Gehlot, Namrata Kathuria, Shweta Pandey","doi":"10.1109/IC3I56241.2022.10073023","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073023","url":null,"abstract":"Artificial intelligence (AI) gives immediate insights that cut via the vibrations of multitudes of security updates every day. The United Nations converging on majorly on cyber security and thus, emphasized that designers must act quickly to ameliorate this potential danger of cyber threats and make sure that innovative innovations remain a power for good instead of a negative force. This research fosters the advancement of AI concept within cyber security, assists experts in establishing research paths, and serves as a resource for corporations and authorities in planning AI systems in the field of cybersecurity. As a result, this study conducts a literature review on the uses of artificial intelligence in access permissions authorization, network context monitoring, harmful behaviour surveillance, and unusual traffic detection. At the end, study is concluded with suggestions for the further development in the protection of cyber security.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130034407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. D. Arora, Navdeep Kumar Chopra, N. Gopinath, Sathish Kumar Ravichandran, M. Chakravarthi, Durgaprasad Gangodkar
{"title":"Data Reduction Techniques in Wireless Sensor Networks with AI","authors":"G. D. Arora, Navdeep Kumar Chopra, N. Gopinath, Sathish Kumar Ravichandran, M. Chakravarthi, Durgaprasad Gangodkar","doi":"10.1109/IC3I56241.2022.10073380","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073380","url":null,"abstract":"Due to their numerous uses in practically every part of life and their related problems, such as energy saving, a longer life cycle, and better resource usage, the research of wireless sensor networks is ongoing. Its extensive use successfully saves and processes a considerable volume of sensor data. Since the sensor nodes are frequently placed in challenging locations where less expensive resources are required for data collection and processing, this presents a new difficulty. One method for minimizing the quantity of sensor data is data reduction. A review of data reduction methods has been provided in this publication. The different data reduction approaches that have been put forth over the years have been examined, along with their advantages and disadvantages, ways in which they can be helpful, and whether or not using them in contexts with limited resources is worthwhile.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129044462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ranjeet Yadav, Ritambhara, Karthik Kumar Vaigandla, G. S. P. Ghantasala, R. Singh, Durgaprasad Gangodkar
{"title":"The Block Chain Technology to protect Data Access using Intelligent Contracts Mechanism Security Framework for 5G Networks","authors":"Ranjeet Yadav, Ritambhara, Karthik Kumar Vaigandla, G. S. P. Ghantasala, R. Singh, Durgaprasad Gangodkar","doi":"10.1109/IC3I56241.2022.10072740","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072740","url":null,"abstract":"The introduction of the study primarily emphasises the significance of utilising block chain technologies with the possibility of privacy and security benefits from the 5G Network. One may state that the study’s primary focus is on all the advantages of adopting block chain technology to safeguard everyone’s access to crucial data by utilizing intelligent contracts to enhance the 5G network security model on information security operations.Our literature evaluation for the study focuses primarily on the advantages advantages of utilizing block chain technology advance data security and privacy, as well as their development and growth. The whole study paper has covered both the benefits and drawbacks of employing the block chain technology. The literature study part of this research article has, on the contrary hand, also studied several approaches and tactics for using the blockchain technology facilities. To fully understand the circumstances in this specific case, a poll was undertaken. It was possible for the researchers to get some real-world data in this specific situation by conducting a survey with 51 randomly selected participants.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129134417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}