{"title":"Internet of Things (IoT) based Object Recognition Technologies","authors":"K. Srinivasan, V. Azhaguramyaa","doi":"10.1109/I-SMAC47947.2019.9032689","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032689","url":null,"abstract":"Over the past years, the Object recognition technologies have matured to a great extent, where it has enabled the development of exciting solutions for visually impaired. A variety of solutions has been proposed using computer vision and object recognition to help the visually impaired with their day-to-day activities. This paper aims at the development of a solution that can be adopted by the visually impaired for identifying and locating household objects in their daily life. The solution includes a wearable device that listens for the user's voice, understands the user's command and locates the object in the surrounding environment. Once the target object is located, it gives user the information about the object and the maximum possible distance of the object from the user. The performance of the device has been increased and the battery consumption has been decreased by adopting an efficient algorithm that makes the device usable in day-to-day life.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114966605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aryan Khanna, B. Manoj, Yashashwini T, G. M. Parihar, Richa Maurya, R. B
{"title":"DeepStreak: Automating Car Racing Games for Self Driving using Artificial Intelligence","authors":"Aryan Khanna, B. Manoj, Yashashwini T, G. M. Parihar, Richa Maurya, R. B","doi":"10.1109/I-SMAC47947.2019.9032527","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032527","url":null,"abstract":"Commercial Video games are becoming popular with the advent of Artificial Intelligence. Most of the online or offline video games are passive i.e. they strictly follow the scripted instructions. And then there are trending competitions in AI-based games that need to generate auto-scripts and auto-interactions to adapt to the dynamic scenario, improve performance and also resolve the challenges which are faced in real-time. Hence there is a need to develop new techniques with intelligence which can have a significant impact on the gaming industry. Thus, this paper discusses the list of challenges and research opportunities available for developing new AI techniques that can be used by computer game developers and proposes techniques to completely automate the video games using three different approaches including key points being data augmentation and segmentation techniques followed by feeding data to CNNs.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"20 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113970923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AI-Powered Image-Based Tomato Leaf Disease Detection","authors":"L. S. P. Annabel, V. Muthulakshmi","doi":"10.1109/I-SMAC47947.2019.9032621","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032621","url":null,"abstract":"The development of Artificial Intelligence over few decades had been incredible, where it converts every segment of the global economy, including agriculture. The traditional approach of the agricultural industry is experiencing a vital revolution. With requiremesnts of better crop yield, AI has been developed as a powerful tool to permit farmers in monitoring and detecting the crop diseases. In addition, farmers can easily identify the crop diseases in early stage by using AI. As traditional plant disease identification includes expertise and high processing time, AI is integrated with image processing with an objective of providing accurate, fast, efficient and inexpensive solution for disease detection. In this paper, novel tomato leaf disease detection is proposed which comprises of four different phases that includes image preprocessing, segmentation, feature extraction and image classification. RGB to grayscale conversion, thresholding, GLCM and random forest classifier are the various algorithms that are used for implementation of the proposed method. The results indicate that the proposed method classifies the diseases with an accuracy of 94.1%.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124790119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Bat and Genetic Algorthim Approach for Cost Effective SaaS Placement in Cloud Environment","authors":"Jemal Nuradis, Frezewud Lemma","doi":"10.1109/I-SMAC47947.2019.9032665","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032665","url":null,"abstract":"The increasing demand of software service in cloud environment needs strategic placement in the cloud infrastructure. Thus, in which the users use the service based on the service model of the provider and pays based on their use of the resources. These resources are storage, memory processing element and bandwidth. Efficient optimal placement is the main issue in order to provide a cost effective service to the user. This research has proposed hybrid approaches to addresses the initial software task placement problem by exploring the advantage of both Bat algorithm (BA) and Genetic algorithm (GA), to make the initial ST placement processes optimum and cost effective. In order to evaluate the performance of the proposed hybrid algorithms, an experimental environment had configured using CloudSim simulation tool. The proposed solution performance has evaluated by compared with those existing placement algorithms such as Genetic Algorithm (GA) and Particle Swarm Optimization algorithm (PSO). According to the result the proposed algorithm has reduced the placement cost up to 2 −13% on a cloud environment.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125131385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection in Internet of Things (IoTs) Based Applications using Blockchain Technolgy","authors":"Shashvi Mishra, A. Tyagi","doi":"10.1109/I-SMAC47947.2019.9032557","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032557","url":null,"abstract":"Data security plays an important role in the healthcare monitoring systems, where critical patient data is transacted over the internet especially through wireless devices, wireless routes such as optical radio channels, or optical fiber-related transport networks. In one way or the other every device is connected to internet and we address such things as internet connected things. As the network is moving towards wireless applications, the threat to attack is also becoming a crucial issue. These attacks can be identified through various intrusion detection techniques and some of which were discussed in the previous decades. The intrusion detection technique is used to identify the privacy breach in the network. Its main purpose is to detect the unauthorized access. Some of the systems or networks that need protection are part of wireless networks (Things connected to internet). Wireless network applications comprises of WLANs (Wireless Local Area Networks), WPANs (Wireless Personal Area Networks), ad hoc networks etc. Since digitization is taking place in each and every sector and so the threat to data also exist. In this article, we protect IoT based E-healthcare systems by using a novel concept called “Blockchain Technology”.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127174686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saiqa Khan, Zainab Pirani, Taniya Fansupkar, Umama Maghrabi
{"title":"Shadow Removal from Digital Images using Multi-channel Binarization and Shadow Matting","authors":"Saiqa Khan, Zainab Pirani, Taniya Fansupkar, Umama Maghrabi","doi":"10.1109/I-SMAC47947.2019.9032447","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032447","url":null,"abstract":"Shadow removal has developed gradually as a preprocessing step for image classification, object detection, information extraction, etc. Existing techniques used by researchers typically make use of segmentation, deep learning to obtain accurate results, which leads to the high cost of processing the image. This paper presents a comprehensive survey study of shadow detection and removal from images. We present our methodology for improving the process of shadow removal which will use machine learning to train the system with standard dataset available (for eg. SBU->Stony Brook University[12]) and then a test data will be entered by the user via an easy to use user application. Training the images will include converting the image into grayscale, YCbCr and CIE L*a*b* colorspace then performing multi-channel binarization which will convert the image to binary on the basis of a threshold value for shadow detection. This shadow detected image will then be filtered to remove noisy false positive regions. This filtered image will be passed to the Canny edge detection algorithm for detecting edges of shadow and then repainting it by shadow matting technique to remove shadows.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117002742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Intrusion Detection System using Machine Learning Classification Algorithm based on different feature selection approach","authors":"P. Illavarason, B. Kamachi Sundaram","doi":"10.1109/I-SMAC47947.2019.9032499","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032499","url":null,"abstract":"Network security is the most challenging task of the modern digital era. Due to the development in internet, the number of network attacks has also increased, this is prevented by access control, key manager, and intrusion detection system. Among these the most challenging task is intrusion detection system that ensures the network security. The current approach focuses on the important issues in intrusion detection system, which will identify the unwanted attacks and unauthorized access in the network. The comprehensive overview of the detailed survey is analyzed with the existing data set for identifying the unusual attacks that can understand the current issues in intrusion detection problems. The detailed investigation is reported for observing several issues on the intrusive performance by using the machine learning classification. Here machine learning classification algorithm is used for detecting the several category of attacks. Furthermore, this study evaluates the performance criteria based on the feature extraction and machine learning classification techniques algorithm. Finally, based on the results observed we recommend some important features by using machine learning classification in order to find out the efficient method for detecting the particular attack.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127095521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cloud computing-based Advanced Encryption Standard","authors":"Quazi Warisha Ahmed, S. Garg","doi":"10.1109/I-SMAC47947.2019.9032581","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032581","url":null,"abstract":"Today cloud computing is emerging as an indispensable factor in our day-to-day lives. Its fame is rising at an exponential rate along with its growth. It serves its client with distinct computing capabilities like computation, storage, networking, applications, etc., over the internet upon a particular request. Among all the above capabilities, storage plays a crucial role in facilitating its client by giving its framework on rent basis. Even though cloud computing is having a lot of benefits, its acceptance is still lagging behind as a result of security concerns. The information that we keep in clouds is likely to be abused by an unapproved individual or the cloud specialists to cooperate itself. The paper gives a brief idea of cloud computing data security, and various methods are used in ensuring the security of data and we have compared various encryption algorithm used for encrypting data in the cloud.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124494006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nilatpal Chakrabarty, Ankita Debnath, Deepanwita Mallick, S. Banerjee
{"title":"Q-Learning Elicited Disaster Management System Using Intelligent Mapping Approach","authors":"Nilatpal Chakrabarty, Ankita Debnath, Deepanwita Mallick, S. Banerjee","doi":"10.1109/I-SMAC47947.2019.9032630","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032630","url":null,"abstract":"Artificial Intelligence (AI) is one of the thought provoking areas of exploration within the research community. In this area, reinforcement learning and computer vision techniques are coming under the focus. Research in AI focuses on the development and analysis of algorithms that perform intelligent behavior with minimal human intervention. Moreover, from several literatures it has been observed that enormous investigations have also been performed in robotics. In this paper, initially an attempt has been made to design an intelligent system triggered by improved Q-learning algorithm which can map in any unknown disaster environments and perform in a proficient fashion. Thereafter, the concept of robotics has been amalgamated to test the enhanced performance of the proposed system in real time. Thereafter, the performance of the proposed system has also been studied under different environments like constrained and unconstrained.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127807920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vedha Krishna Yarasuri, Gowtham Kishore Indukuri, Aswathy K. Nair
{"title":"Prediction of Hepatitis Disease Using Machine Learning Technique","authors":"Vedha Krishna Yarasuri, Gowtham Kishore Indukuri, Aswathy K. Nair","doi":"10.1109/I-SMAC47947.2019.9032585","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032585","url":null,"abstract":"The objective of this work is to choose the best tool for diagnosis and detection of Hepatitis as well as for the prediction of life expectancy of Hepatitis patients. In this work, a comparative study between various machine learning tools and neural networks were carried out. The performance metric is based on the accuracy rate and the mean square error. The Machine Learning (ML) algorithms such as Support Vector Machines (SVM), K Nearest Neighbor (KNN) and Artificial Neural Network (ANN) were considered as the classification and prediction tools for diagnosing Hepatitis disease. A brief study on the above algorithms were performed based on the prediction accuracy of disease diagnosis. All the ML algorithms were implemented and validated using MATLAB software.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132352859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}