{"title":"Designing An Automated system To Check The Availability Of Particular Blood Group In The Blood Bank In Comparison With IR Sensor And Conventional Method","authors":"D.Venkateswara Reddy, D. Rani","doi":"10.1109/ICBATS54253.2022.9759031","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759031","url":null,"abstract":"Aim: The aim of this study is to design an automatic sensor system to check and update the bloodstock in the blood bank. Materials and Method: The samples are collected based on two groups, IR sensor (N=27) and Conventional method (N=27) with alpha error-threshold 0.05, enrollment ratio as 0:1, 95% confidence level, power 80%. It involves both hardware and software program implementation. The software and hardware activate the sensor and check the blood availability and display on the web page at the same time. Results: There is a statistically insignificant difference between both methods (p=0.5, p>0.05, chi-square test). Conclusion: IR sensors used for novel blood availability checks in the blood banks appear to show better results than the conventional method of bloodstock check in the blood banks.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130039493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. Khan, Komal Saleem, Tauqeer Faiz, J. Malik, Muhammad Saeed Khan, Zawaria Sadaf
{"title":"Predicting Distributed Network Malicious Data Packets in Smart City using Deep Learning","authors":"W. Khan, Komal Saleem, Tauqeer Faiz, J. Malik, Muhammad Saeed Khan, Zawaria Sadaf","doi":"10.1109/ICBATS54253.2022.9759078","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759078","url":null,"abstract":"Smart city completely employs the new expertise in the development of built-up informatization to enhance the whole city management and service. Smart city collects wide range of information from people and monitor their social activities. However, this arise privacy and security issue in smart city, which is a prevalent concern. Potential threat to privacy and confidential data leads to a myriad of concerns in today’s world, particularly encircling smart city accesses. Previously various methods were used such as SVM, Logistic Regression, Naïve Bayes and more, using large datasets their limitations included lack of accuracy increasing the risk. To tackle the harmful packets from multiple virtual sources an optimal solution of Deep Extreme Neural Network (DENN) expert system is rendered and presented using a dataset of requests received by smart city. Accuracy of 92% is attained. In addition, ample medians of attacks are discussed that can be prevented using the same safety barrier.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"7 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121008684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayat Alroshan, Tayba Asgher, M. Hussain, Muhammad Shahzad, Faiz Rasool, Ahmed Abu-Khadrah
{"title":"Virtual Trust on Driverless Cars Using Fuzzy Logic Design","authors":"Ayat Alroshan, Tayba Asgher, M. Hussain, Muhammad Shahzad, Faiz Rasool, Ahmed Abu-Khadrah","doi":"10.1109/ICBATS54253.2022.9759077","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759077","url":null,"abstract":"People’s interest in self-driving cars is increasing day by day. How they affect our daily lives and how they benefit us in different ways. These cars are also called robotic cars. These vehicles work with the latest technology to meet the needs of human transportation without any interference. This is a major development in the car manufacturing industry using the latest technology features. These cars communicate with each other over a wireless network. These cars take note of their surroundings with cameras and sensors. Their positions are tracked by navigation paths, GPS radar, etc. If the current path changes, the cars change their position through the modern control system. These cars reduce traffic accidents, increase confidence, and increase road capacity. The main advantage is to reduce the traffic police and no car insurance policy is required, self-drive cars use less fuel than other cars. But on the other hand, issues related to software such as cybersecurity, reliability need to be overcome. The most important thing is related to driver jobs which are most dangerous for human beings. This paper deals with the calculation of virtual trust on driverless cars using fuzzy logic design. Verified results and analysis obtained through the Mamdani Fuzzy Inference System to test virtual trust in driverless cars. Results have been verified using MATLAB simulation.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132560561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Shahid, Kashif Munir, Salman Muneer, Mutiullah, M. Jarrah, Umer Farooq
{"title":"Implementation of ML Algorithm for Mung Bean Classification using Smart Phone","authors":"M. Shahid, Kashif Munir, Salman Muneer, Mutiullah, M. Jarrah, Umer Farooq","doi":"10.1109/ICBATS54253.2022.9759090","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759090","url":null,"abstract":"This work is an extension of my work presented a robust and economically efficient method for the discrimination of four Mung-Beans varieties based on quantitative parameters, Due to the advancement of technology day by day users try to find the solutions to their daily life problems using smartphones but still there is limited resources are available in smartphone concerning computing power and memory so there is need to find the best classifier which can classify the Mung-Beans using already suggested features in previous work with minimum memory requirements and computational power. For achieving the goal of this study, we take the experiments on various supervised classifiers which have simple architecture and calculations and give the robust performance on the most relevant 10 suggested features are selected by Fisher Co-efficient, Probability of Error, Mutual Information, and wavelet features. After the analysis, we replace the Artificial Neural Network and Deep learning with such a classifier which gives approximately the same classification results as the above classifier but is efficient in terms of resources and time complexity. This classifier is easily implemented in the smartphone environment.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anam Yasir, A. Ahmad, Sagheer Abbas, Mohammad Inairat, A. Al-kassem, Atta Rasool
{"title":"How Artificial Intelligence Is Promoting Financial Inclusion? A Study On Barriers Of Financial Inclusion","authors":"Anam Yasir, A. Ahmad, Sagheer Abbas, Mohammad Inairat, A. Al-kassem, Atta Rasool","doi":"10.1109/ICBATS54253.2022.9759038","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759038","url":null,"abstract":"Financial inclusion has received wider attention from policymakers worldwide, as it is considered a strong pillar for human development also. Traditional financial systems of countries are not able enough to attract all segments of society. There are various barriers to the legacy system which hinder the involvement of privileged members of society in the financial sector. This study is intended to provide theoretical insights on the role of Artificial Intelligence (AI) in promoting financial inclusion. The study supports the argument by providing realtime examples of AI applications being deployed by various countries in removing barriers to financial inclusion. AI implementation for promoting financial inclusion can be made possible by supporting regulatory framework and infrastructure.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132371649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Text to speech synthesizer using Syllabification synthesis algorithm and comparing with Articulator Synthesis algorithm","authors":"E. Alexandra, P. Bharathi","doi":"10.1109/ICBATS54253.2022.9759063","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759063","url":null,"abstract":"Aim: The aim of the study is to design and implement a Text to speech Synthesizer based on syllabification synthesis algorithm and articulator synthesis algorithm to reduce computational time and to increase effectiveness in speech intelligibility. Materials and methods: The Text Datasets was used to implement the algorithm and sample for 10 different Text databases having different numbers of words.The input text Datasets will be ranging from 50-500 words. Results: The Statistical analysis was calculated and done by performing Independent Variable test and T-test and the obtained significance is 0.039 (p<0.05). The mean computational time of proposed algorithm 90% and the existing algorithm which is 78%. Conclusion: The algorithm based on the Syllabification algorithm shows higher computational time and lesser effectiveness in speech intelligence than the innovative algorithm based on Articulator speech synthesis.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132377388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Based Collision Avoidance for Smart Vehicle to Vehicle Communication","authors":"Anup Lal Yadav, S. Goyal","doi":"10.1109/ICBATS54253.2022.9759034","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759034","url":null,"abstract":"The main causes of accidents are roads that have been broken and weathered, dangerous weather and human errors such as speed, distracted traffic and non-controlled road safety This is irritating to keep the speed balance to prevent accidents and to ensure the driver’s safety. A new approach is therefore proposed to prevent accidents and to save victims during accidents. When the distance between two vehicles is too short, sensors are used to give alarm ‘ON’ If an accident occurs, the camera is switched on automatically and takes the images at about 180%. Including location, this information is transmitted by GSM modem to the nearest police, ambulance and family stations. An Arduino, motion sensor and touch sensors as well as a relay and the GSM modem are the main elements of the project.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128043343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Improvement Of Data Gathering In Underwater Wireless Sensor Network Using Robust Energy Efficient Adaptive Routing Protocol with comparison over Energy Efficient Data gathering algorithm","authors":"K.Gnana Teja, S. Sivasakthiselvan","doi":"10.1109/ICBATS54253.2022.9759046","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759046","url":null,"abstract":"Robust Energy Efficient Adaptive Routing Protocol (REARP) is being used in comparison to Energy Efficient Data gathering algorithm (EEDG) in order to avoid needless transmissions and balance energy consumption among sensors. The performance metrics of robust energy efficient adaptive routing protocol for transfer of data and balancing energy is compared with energy efficient data gathering algorithms. The algorithms are tested in a network simulator with independent samples of 16 for each group and obtained the dependent variables like improved energy efficiency, high throughput and high packet delivery ratio. The algorithm performance is verified and the result shows that Robust Energy Efficient Adaptive Routing algorithm outperforms the Energy Efficient Data gathering algorithm (EEDG) in terms of throughput, pdr and Energy. Throughput mean value is (1.3853), Energy consumption mean value is (1.0161) and Packet delivery ratio mean value is (94.7813) achieved using Robust Energy Efficient Adaptive Routing algorithm. statistical analysis shows that significant value(<0.01). The simulation results show the collection of data and improved energy consumption of the sensor network using the proposed REAR algorithm in comparison with EEDG.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125454542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Patient Monitoring System using Artificial Neural Networks technique comparing with Time Series Analysis","authors":"B. Kumar, T.P. Anithaashri","doi":"10.1109/ICBATS54253.2022.9759023","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759023","url":null,"abstract":"Aim: To enhance patient monitoring system using Artificial neural network technique to compare the performance of the same with time series analysis. Materials and methods: The Artificial Neural Network(ANN) technique is used to deal with patient data extracted from physical tests and real-time tests in hospitals to improvise patient monitoring systems with the novelty in terms of interaction with patients and patient readmission status ANN. The implementation has been carried out using the anaconda navigator tool. The algorithms tested over more than 700 sets of patient test data and train data which has been utilized to analyse the performance. Result: The analysis of the data sets and the patient readmission status by feature extraction has been carried out successfully and acquired 80% accuracy using artificial neural network technique and compared to time series analysis, which gave 66% accuracy. With the level of significance (p<0.05), the resultant data depicts the reliability in independent sample t-tests. Conclusion: Implemented novel patient monitoring system using the ANN technique is more significant than a time series analysis in terms of accuracy. SPSS analysis helped to depict the reliability of data with the dependent variable of accuracy and independent variables of loss.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125532431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taj-Aldeen Naser Abdali, Rosilah Hassan, A. Aman, Musatafa Abbas Abbood Albadr, Fahad Taha Al-Dhief, H. N. A. Ali
{"title":"A Comparison Test Performance for The Enhanced Hyper-Angle Exploitative Searching Algorithm","authors":"Taj-Aldeen Naser Abdali, Rosilah Hassan, A. Aman, Musatafa Abbas Abbood Albadr, Fahad Taha Al-Dhief, H. N. A. Ali","doi":"10.1109/ICBATS54253.2022.9759032","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759032","url":null,"abstract":"Multi-Objective Evolutionary Algorithms (MOEAs) maximize multiple objective functions using heuristic random searching to identify a collection of non-dominated solutions. In particular, multi-objective searching ranks solutions based on a subset of non-dominated solutions. The state-of-the-art, which is one of the evolutionary algorithms, is the second edition of the classical Fast Non-dominated Sorting Genetic Algorithm (NSGAII). However, the selection operator was enhanced and developed for optimal performance. This article shows the performance of the enhanced NSGA-II from the Pareto front and the number of non-dominated solutions on the basis of the Fonseca-Fleming problem (FON). The proposed enhancement was showing 100% performance in the comparison of the founded solutions with the benchmarks.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}