2022 International Conference on Business Analytics for Technology and Security (ICBATS)最新文献

筛选
英文 中文
Designing An Automated system To Check The Availability Of Particular Blood Group In The Blood Bank In Comparison With IR Sensor And Conventional Method 设计一种自动检测血库中特定血型可用性的系统,并与红外传感器和传统方法进行比较
2022 International Conference on Business Analytics for Technology and Security (ICBATS) Pub Date : 2022-02-16 DOI: 10.1109/ICBATS54253.2022.9759031
D.Venkateswara Reddy, D. Rani
{"title":"Designing An Automated system To Check The Availability Of Particular Blood Group In The Blood Bank In Comparison With IR Sensor And Conventional Method","authors":"D.Venkateswara Reddy, D. Rani","doi":"10.1109/ICBATS54253.2022.9759031","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759031","url":null,"abstract":"Aim: The aim of this study is to design an automatic sensor system to check and update the bloodstock in the blood bank. Materials and Method: The samples are collected based on two groups, IR sensor (N=27) and Conventional method (N=27) with alpha error-threshold 0.05, enrollment ratio as 0:1, 95% confidence level, power 80%. It involves both hardware and software program implementation. The software and hardware activate the sensor and check the blood availability and display on the web page at the same time. Results: There is a statistically insignificant difference between both methods (p=0.5, p>0.05, chi-square test). Conclusion: IR sensors used for novel blood availability checks in the blood banks appear to show better results than the conventional method of bloodstock check in the blood banks.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130039493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting Distributed Network Malicious Data Packets in Smart City using Deep Learning 基于深度学习的智慧城市分布式网络恶意数据包预测
2022 International Conference on Business Analytics for Technology and Security (ICBATS) Pub Date : 2022-02-16 DOI: 10.1109/ICBATS54253.2022.9759078
W. Khan, Komal Saleem, Tauqeer Faiz, J. Malik, Muhammad Saeed Khan, Zawaria Sadaf
{"title":"Predicting Distributed Network Malicious Data Packets in Smart City using Deep Learning","authors":"W. Khan, Komal Saleem, Tauqeer Faiz, J. Malik, Muhammad Saeed Khan, Zawaria Sadaf","doi":"10.1109/ICBATS54253.2022.9759078","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759078","url":null,"abstract":"Smart city completely employs the new expertise in the development of built-up informatization to enhance the whole city management and service. Smart city collects wide range of information from people and monitor their social activities. However, this arise privacy and security issue in smart city, which is a prevalent concern. Potential threat to privacy and confidential data leads to a myriad of concerns in today’s world, particularly encircling smart city accesses. Previously various methods were used such as SVM, Logistic Regression, Naïve Bayes and more, using large datasets their limitations included lack of accuracy increasing the risk. To tackle the harmful packets from multiple virtual sources an optimal solution of Deep Extreme Neural Network (DENN) expert system is rendered and presented using a dataset of requests received by smart city. Accuracy of 92% is attained. In addition, ample medians of attacks are discussed that can be prevented using the same safety barrier.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"7 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121008684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Trust on Driverless Cars Using Fuzzy Logic Design 基于模糊逻辑设计的无人驾驶汽车虚拟信任
2022 International Conference on Business Analytics for Technology and Security (ICBATS) Pub Date : 2022-02-16 DOI: 10.1109/ICBATS54253.2022.9759077
Ayat Alroshan, Tayba Asgher, M. Hussain, Muhammad Shahzad, Faiz Rasool, Ahmed Abu-Khadrah
{"title":"Virtual Trust on Driverless Cars Using Fuzzy Logic Design","authors":"Ayat Alroshan, Tayba Asgher, M. Hussain, Muhammad Shahzad, Faiz Rasool, Ahmed Abu-Khadrah","doi":"10.1109/ICBATS54253.2022.9759077","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759077","url":null,"abstract":"People’s interest in self-driving cars is increasing day by day. How they affect our daily lives and how they benefit us in different ways. These cars are also called robotic cars. These vehicles work with the latest technology to meet the needs of human transportation without any interference. This is a major development in the car manufacturing industry using the latest technology features. These cars communicate with each other over a wireless network. These cars take note of their surroundings with cameras and sensors. Their positions are tracked by navigation paths, GPS radar, etc. If the current path changes, the cars change their position through the modern control system. These cars reduce traffic accidents, increase confidence, and increase road capacity. The main advantage is to reduce the traffic police and no car insurance policy is required, self-drive cars use less fuel than other cars. But on the other hand, issues related to software such as cybersecurity, reliability need to be overcome. The most important thing is related to driver jobs which are most dangerous for human beings. This paper deals with the calculation of virtual trust on driverless cars using fuzzy logic design. Verified results and analysis obtained through the Mamdani Fuzzy Inference System to test virtual trust in driverless cars. Results have been verified using MATLAB simulation.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132560561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of ML Algorithm for Mung Bean Classification using Smart Phone 智能手机上绿豆分类的ML算法实现
2022 International Conference on Business Analytics for Technology and Security (ICBATS) Pub Date : 2022-02-16 DOI: 10.1109/ICBATS54253.2022.9759090
M. Shahid, Kashif Munir, Salman Muneer, Mutiullah, M. Jarrah, Umer Farooq
{"title":"Implementation of ML Algorithm for Mung Bean Classification using Smart Phone","authors":"M. Shahid, Kashif Munir, Salman Muneer, Mutiullah, M. Jarrah, Umer Farooq","doi":"10.1109/ICBATS54253.2022.9759090","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759090","url":null,"abstract":"This work is an extension of my work presented a robust and economically efficient method for the discrimination of four Mung-Beans varieties based on quantitative parameters, Due to the advancement of technology day by day users try to find the solutions to their daily life problems using smartphones but still there is limited resources are available in smartphone concerning computing power and memory so there is need to find the best classifier which can classify the Mung-Beans using already suggested features in previous work with minimum memory requirements and computational power. For achieving the goal of this study, we take the experiments on various supervised classifiers which have simple architecture and calculations and give the robust performance on the most relevant 10 suggested features are selected by Fisher Co-efficient, Probability of Error, Mutual Information, and wavelet features. After the analysis, we replace the Artificial Neural Network and Deep learning with such a classifier which gives approximately the same classification results as the above classifier but is efficient in terms of resources and time complexity. This classifier is easily implemented in the smartphone environment.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
How Artificial Intelligence Is Promoting Financial Inclusion? A Study On Barriers Of Financial Inclusion 人工智能如何促进普惠金融?普惠金融障碍研究
2022 International Conference on Business Analytics for Technology and Security (ICBATS) Pub Date : 2022-02-16 DOI: 10.1109/ICBATS54253.2022.9759038
Anam Yasir, A. Ahmad, Sagheer Abbas, Mohammad Inairat, A. Al-kassem, Atta Rasool
{"title":"How Artificial Intelligence Is Promoting Financial Inclusion? A Study On Barriers Of Financial Inclusion","authors":"Anam Yasir, A. Ahmad, Sagheer Abbas, Mohammad Inairat, A. Al-kassem, Atta Rasool","doi":"10.1109/ICBATS54253.2022.9759038","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759038","url":null,"abstract":"Financial inclusion has received wider attention from policymakers worldwide, as it is considered a strong pillar for human development also. Traditional financial systems of countries are not able enough to attract all segments of society. There are various barriers to the legacy system which hinder the involvement of privileged members of society in the financial sector. This study is intended to provide theoretical insights on the role of Artificial Intelligence (AI) in promoting financial inclusion. The study supports the argument by providing realtime examples of AI applications being deployed by various countries in removing barriers to financial inclusion. AI implementation for promoting financial inclusion can be made possible by supporting regulatory framework and infrastructure.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132371649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Design and Implementation of Text to speech synthesizer using Syllabification synthesis algorithm and comparing with Articulator Synthesis algorithm 基于音节合成算法的文本到语音合成器的设计与实现,并与发音合成算法进行了比较
2022 International Conference on Business Analytics for Technology and Security (ICBATS) Pub Date : 2022-02-16 DOI: 10.1109/ICBATS54253.2022.9759063
E. Alexandra, P. Bharathi
{"title":"Design and Implementation of Text to speech synthesizer using Syllabification synthesis algorithm and comparing with Articulator Synthesis algorithm","authors":"E. Alexandra, P. Bharathi","doi":"10.1109/ICBATS54253.2022.9759063","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759063","url":null,"abstract":"Aim: The aim of the study is to design and implement a Text to speech Synthesizer based on syllabification synthesis algorithm and articulator synthesis algorithm to reduce computational time and to increase effectiveness in speech intelligibility. Materials and methods: The Text Datasets was used to implement the algorithm and sample for 10 different Text databases having different numbers of words.The input text Datasets will be ranging from 50-500 words. Results: The Statistical analysis was calculated and done by performing Independent Variable test and T-test and the obtained significance is 0.039 (p<0.05). The mean computational time of proposed algorithm 90% and the existing algorithm which is 78%. Conclusion: The algorithm based on the Syllabification algorithm shows higher computational time and lesser effectiveness in speech intelligence than the innovative algorithm based on Articulator speech synthesis.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132377388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Collision Avoidance for Smart Vehicle to Vehicle Communication 基于物联网的智能车对车通信防撞技术
2022 International Conference on Business Analytics for Technology and Security (ICBATS) Pub Date : 2022-02-16 DOI: 10.1109/ICBATS54253.2022.9759034
Anup Lal Yadav, S. Goyal
{"title":"IoT Based Collision Avoidance for Smart Vehicle to Vehicle Communication","authors":"Anup Lal Yadav, S. Goyal","doi":"10.1109/ICBATS54253.2022.9759034","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759034","url":null,"abstract":"The main causes of accidents are roads that have been broken and weathered, dangerous weather and human errors such as speed, distracted traffic and non-controlled road safety This is irritating to keep the speed balance to prevent accidents and to ensure the driver’s safety. A new approach is therefore proposed to prevent accidents and to save victims during accidents. When the distance between two vehicles is too short, sensors are used to give alarm ‘ON’ If an accident occurs, the camera is switched on automatically and takes the images at about 180%. Including location, this information is transmitted by GSM modem to the nearest police, ambulance and family stations. An Arduino, motion sensor and touch sensors as well as a relay and the GSM modem are the main elements of the project.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128043343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Improvement Of Data Gathering In Underwater Wireless Sensor Network Using Robust Energy Efficient Adaptive Routing Protocol with comparison over Energy Efficient Data gathering algorithm 基于鲁棒高能效自适应路由协议的水下无线传感器网络数据采集性能改进与高能效数据采集算法比较
2022 International Conference on Business Analytics for Technology and Security (ICBATS) Pub Date : 2022-02-16 DOI: 10.1109/ICBATS54253.2022.9759046
K.Gnana Teja, S. Sivasakthiselvan
{"title":"Performance Improvement Of Data Gathering In Underwater Wireless Sensor Network Using Robust Energy Efficient Adaptive Routing Protocol with comparison over Energy Efficient Data gathering algorithm","authors":"K.Gnana Teja, S. Sivasakthiselvan","doi":"10.1109/ICBATS54253.2022.9759046","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759046","url":null,"abstract":"Robust Energy Efficient Adaptive Routing Protocol (REARP) is being used in comparison to Energy Efficient Data gathering algorithm (EEDG) in order to avoid needless transmissions and balance energy consumption among sensors. The performance metrics of robust energy efficient adaptive routing protocol for transfer of data and balancing energy is compared with energy efficient data gathering algorithms. The algorithms are tested in a network simulator with independent samples of 16 for each group and obtained the dependent variables like improved energy efficiency, high throughput and high packet delivery ratio. The algorithm performance is verified and the result shows that Robust Energy Efficient Adaptive Routing algorithm outperforms the Energy Efficient Data gathering algorithm (EEDG) in terms of throughput, pdr and Energy. Throughput mean value is (1.3853), Energy consumption mean value is (1.0161) and Packet delivery ratio mean value is (94.7813) achieved using Robust Energy Efficient Adaptive Routing algorithm. statistical analysis shows that significant value(<0.01). The simulation results show the collection of data and improved energy consumption of the sensor network using the proposed REAR algorithm in comparison with EEDG.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125454542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Patient Monitoring System using Artificial Neural Networks technique comparing with Time Series Analysis 采用人工神经网络技术与时间序列分析相比较的新型病人监护系统
2022 International Conference on Business Analytics for Technology and Security (ICBATS) Pub Date : 2022-02-16 DOI: 10.1109/ICBATS54253.2022.9759023
B. Kumar, T.P. Anithaashri
{"title":"Novel Patient Monitoring System using Artificial Neural Networks technique comparing with Time Series Analysis","authors":"B. Kumar, T.P. Anithaashri","doi":"10.1109/ICBATS54253.2022.9759023","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759023","url":null,"abstract":"Aim: To enhance patient monitoring system using Artificial neural network technique to compare the performance of the same with time series analysis. Materials and methods: The Artificial Neural Network(ANN) technique is used to deal with patient data extracted from physical tests and real-time tests in hospitals to improvise patient monitoring systems with the novelty in terms of interaction with patients and patient readmission status ANN. The implementation has been carried out using the anaconda navigator tool. The algorithms tested over more than 700 sets of patient test data and train data which has been utilized to analyse the performance. Result: The analysis of the data sets and the patient readmission status by feature extraction has been carried out successfully and acquired 80% accuracy using artificial neural network technique and compared to time series analysis, which gave 66% accuracy. With the level of significance (p<0.05), the resultant data depicts the reliability in independent sample t-tests. Conclusion: Implemented novel patient monitoring system using the ANN technique is more significant than a time series analysis in terms of accuracy. SPSS analysis helped to depict the reliability of data with the dependent variable of accuracy and independent variables of loss.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125532431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparison Test Performance for The Enhanced Hyper-Angle Exploitative Searching Algorithm 增强型超角度利用搜索算法的对比测试性能
2022 International Conference on Business Analytics for Technology and Security (ICBATS) Pub Date : 2022-02-16 DOI: 10.1109/ICBATS54253.2022.9759032
Taj-Aldeen Naser Abdali, Rosilah Hassan, A. Aman, Musatafa Abbas Abbood Albadr, Fahad Taha Al-Dhief, H. N. A. Ali
{"title":"A Comparison Test Performance for The Enhanced Hyper-Angle Exploitative Searching Algorithm","authors":"Taj-Aldeen Naser Abdali, Rosilah Hassan, A. Aman, Musatafa Abbas Abbood Albadr, Fahad Taha Al-Dhief, H. N. A. Ali","doi":"10.1109/ICBATS54253.2022.9759032","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759032","url":null,"abstract":"Multi-Objective Evolutionary Algorithms (MOEAs) maximize multiple objective functions using heuristic random searching to identify a collection of non-dominated solutions. In particular, multi-objective searching ranks solutions based on a subset of non-dominated solutions. The state-of-the-art, which is one of the evolutionary algorithms, is the second edition of the classical Fast Non-dominated Sorting Genetic Algorithm (NSGAII). However, the selection operator was enhanced and developed for optimal performance. This article shows the performance of the enhanced NSGA-II from the Pareto front and the number of non-dominated solutions on the basis of the Fonseca-Fleming problem (FON). The proposed enhancement was showing 100% performance in the comparison of the founded solutions with the benchmarks.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信