{"title":"An Efficient IoT Based Electricity Theft Detecting Framework For Electricity Consumption","authors":"Kuldeep Sharma, A. Malik, I. Isha","doi":"10.1109/ICCS54944.2021.00055","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00055","url":null,"abstract":"The framework is designed for the electricity power trading companies for detecting any electricity theft by unauthorized means. The framework is based on the (Internet of Things) IoT techniques. The Data for all consumers tagged to specific geographical area is required to be analyzed by the framework. The framework in first part is analyzing the data of the past consumption of the specific area, this area may be Distribution Transformer level or Feeder Level or any portion of the electricity supply which is suspected of such electricity theft. In the second part, the IoT devices are added to the metering units of the specific sources. From this source, all the electricity supplied to the specific region will be accumulated on real-time basis. Rest IoT devices will be added to different parts of the Electricity Supply Line. Based on the analysis of real-time data accumulated via these IoT devices through Global System for Mobile (GSM) technology at the server located at either Data Center or Cloud Storage as the case may be. The framework will pinpoint the specific area where the theft of electricity is affected. Another vigilance IoT device is used to capture the images of the scenes for monitoring the naked wire for prevention from the electricity theft. The Real-Time reporting of this devices is generating alert to the power distribution company representatives to take necessary steps to reduce the losses occurred due to energy theft. The advanced infrastructure, now a days, is more prone to electricity theft, the Advanced Metering Infrastructure (AMI), is fully machine to machine (M2M) functioning, if such system is compromised, the theft may occur, to stop such electricity theft, since last two decades, various researchers are proposing their expert algorithms to minimize the same. The current paper proposes the additions in the existing literature of electricity theft detection and prevention.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"5 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123804926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aruni Singh, D. P. Kumar, Kelothu Shivaprasad, M. Mohit, Ankita Wadhawan
{"title":"Vehicle Detection And Accident Prediction In Sand/Dust Storms","authors":"Aruni Singh, D. P. Kumar, Kelothu Shivaprasad, M. Mohit, Ankita Wadhawan","doi":"10.1109/ICCS54944.2021.00029","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00029","url":null,"abstract":"In this era of a smart and modern world that is designed by progressing technology, automated vehicles would become a precious part of it. The first thing that strikes in our minds talking about vehicles is traffic and accidents. Accidents could take place because of several reasons: dense traffic, unfavorable weather conditions, sudden braking, change in speed, etc, and the solution to this is machine learning, computer vision, and deep learning. Our focus is to improve the vision in areas of low visibility and predict the future by analyzing the present. Here we introduce a model which would help in dehazing and improving the visibility for a better driving experience in adverse weather especially targeting sandstorms and dust storms which would be quite common in the future because of the afforestation, the procedure is divided into two categories the dehazing and second is vehicle detection, situation analysis, and prediction. We have also incorporated things like estimating traffic density(dense/sparse), and the fire's in the worst situation using python, tensor flow, deep learning, and counting vehicles entering and departing from the frame.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130297813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diagnosis of Pulmonary Tuberculosis through Intelligent Techniques: A Review","authors":"Abdul Karim Siddiqui, V. Garg","doi":"10.1109/ICCS54944.2021.00045","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00045","url":null,"abstract":"Artificial Intelligence is the field of Intelligent Agents. AI has been playing a vital role in healthcare in recent times. In the Medical & Health care field, it is commonly used in classification, to automate the initial result of a CT scan and X-Ray film. ML – especially Deep Learning algorithms – have recently made impressive advances in automatically diagnosing various pulmonary issues, making a clear understanding of treatment criteria and making cheaper costs for patients. The following review emphasizes recent advancements in intelligent techniques applied under pulmonary tuberculosis on different clinical inputs. The result with systematic analysis indicates that a multi agent system having pulmonary TB symptoms & signs of the patient and CXR imaging along with microbiological inputs can diagnose TB threat in a better way.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132329421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Software Clone Detection Techniques for Better Software Maintenance and Reliability","authors":"Chavi Ralhan, Navneet Malik","doi":"10.1109/ICCS54944.2021.00056","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00056","url":null,"abstract":"Major problem in the development of software development is the presence of duplicate code that has a great impact on the overall affect the maintainability of the software. Clone detection technique applied with the core objective to identify the software codes which are identical. Various approached had been proposed in past by various researchers based which are based on text based, and token-based techniques. However, the proposed approaches were not considered very reliable methods due to the inability to find out syntactic differences between programs. Highly effective way to identify syntactic difference is through usage of abstract syntax tree. There are numerous ways to find similarity between two programs. In the proposed work, proposed software clone detection technique software code would be represented in the form of metrics affecting maintenance and reliability of opensource software. Afterwards, features extraction would be done in the form of flexible vectors of different forms to detect different types of clones. Proposed technique would be based upon adaptive prefix filtering on sets of vectors to detect similarity among the vectors. Similarity index detected among the vectors would be used to define given codes as code clones.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Scheme for Data Deduplication Using Advance Machine Learning Architecture in Distributed Systems","authors":"S. Tarun, Ranbir Singh Batth, Sukhpreet Kaur","doi":"10.1109/ICCS54944.2021.00019","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00019","url":null,"abstract":"In a distributed architecture, data as a resource has its own value, but continuous integration of large amounts of data across several locations without cross-verification to preserve a single instance data pattern appears impossible. As a result, systems have encountered hurdles that have a direct influence on the efficiency and performance of distributed workforces. Users need high-quality data or information in order to continue working as improved data services in order to find future trends. However, duplicate data entries in storage repositories are considered a major flaw or stumbling block in the data analysis and query operations processes. As a result, businesses have invested significant resources in detecting duplicate data throughout the duplicate entry detection process. We've introduced a cutting-edge machine learning framework for detecting duplicate data on both current and new data entries. Textual data inputs or queries are imported into memory, preprocessed, and transformed to a vector space model using this technique. To arrange data in groups with equal capacity, a clustering K-means approach is used. To save time and money during the detection phase, similarity computations were done cluster-by-cluster rather than on a huge dataset. The suggested technique performs better than existing deduplication algorithms, with an optimal accuracy of 99.7%. If the result-test and gt-test outcomes are determined to be same during comparison, the accuracy performance parameter of the deduplication process is greater.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116572561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Prabu, A. Tripathi, Kamaljeet Kaur, M. Krishna, Ashim Bora, Mohammed Faez Hasan
{"title":"A Comprehensive Study of Internet of Things and Digital Business on the Economic Growth and its Impact on Human Resource Management","authors":"S. Prabu, A. Tripathi, Kamaljeet Kaur, M. Krishna, Ashim Bora, Mohammed Faez Hasan","doi":"10.1109/ICCS54944.2021.00026","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00026","url":null,"abstract":"The research paper aims to examine the impact of digitalization and IoT technologies on the business world and the ways in which it also impacts the global economy. The paper examines that digital Human Resource Management can increase the productivity and the efficiency of both the HR professionals and the employees of the organisation. The findings of the research also reveals that through digitalisation the HR managers can build better relationships between the employee and the company, can think about the wellbeing of the employees better, and make them feel more valued and appreciated. It can also help in creating a competitive atmosphere in the workplace which can motivate the employees. The research further reveals that the active IoT technologies are increasing in the business world. The articles also analyses the advantages and disadvantages of implementing digitalisation and IoT in the workplace and there exists some requirements that need to be met for the successful implementation of the IoT technology. The research also estimates that in future companies can develop their business by adopting digitalisation. In the paper it is also mentioned that during the pandemic the global economy has decreased and to balance the condition it is important to implement digitalisation in the business world.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126159147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Road Steering system with several metrics (RSSSM): A novel technique for a Smart Vehicular Network to control congestion","authors":"Gaganpreet Kaur Marwah, Anuj.S Jain","doi":"10.1109/ICCS54944.2021.00030","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00030","url":null,"abstract":"Due to a growth in the number of vehicles and people, traffic flow on highways has expanded dramatically during the last few decades. Congestion is caused by fixed road infrastructure and excessive traffic on traffic lanes, especially in developing international cities. In major cities, traffic bottlenecks are common, resulting in increased travel time, increased fuel use, and increased pollution. This paper proposes a Road Steering system with several metrics(RSSSM) that analyses traffic congestion circumstances using many metrics and suggests efficient best routes to vehicles based on those conditions. The suggested mechanism is simulated in the smart vehicular network using SUMO and a python script. The suggested mechanism, RSSSM, beats existing systems, according to the data whether efficiency of traffic, duration of journey, consumption of fuel or level of pollutions are concerned.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126417245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Raghavendra Rao, J. Babu, S. J. Pimo, Asmita Dixit, Sushma Jaiswal, Aatif Jamshed
{"title":"A Comparative Study of NLP based Semantic Web Standard model using SPARQL database","authors":"C. Raghavendra Rao, J. Babu, S. J. Pimo, Asmita Dixit, Sushma Jaiswal, Aatif Jamshed","doi":"10.1109/ICCS54944.2021.00010","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00010","url":null,"abstract":"The work offers evidence of a philosophical idea that many sectors will draw considerable interest. A remote natural language interface (NLI) is the term for the issue of knowledge bases (KBs). The framework uses software from CoreNLP for natural language technology and allows KBs to use the SPARQL query language. Natural Language Processing (NLP) uses the semantics of a natural language query to interpret and produce related information. The query can be asked about KBs containing linked information with properly defined relationships. The related data fits the RDF model in terms of semantic threefold: subject-predicate-objet relationships. The RDF model. The data are connected to the RDF model. Any KB can be understood semantically with our NLI. AI will learn how to grasp the semantics of the RDF data stored in the KB by having the correct training data. Similar information derives from KB questions thanks to its capacity to understand RDF data. Questions can be translated into SPARQL and asked by relational expertise on the KB.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122444839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real time data evaluation with wearable devices: An Impact of Artifact Calibration Method on Emotion Recognition","authors":"F. Fayaz, Arun Malik","doi":"10.1109/ICCS54944.2021.00038","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00038","url":null,"abstract":"Smartwatch technology is transforming the environment of transmission and monitoring for stakeholders and research participants who want to provide real-time data for evaluation. A range of sensors are available in smartwatches for gathering physical activity and location data. Here, combining all of these elements allows the collected data to be sent to a remote computer, allowing for real-time monitoring of physical and perhaps emotional development. Photoplethysmography is an easy and economical optical sensing technology that is commonly used to assess heartbeats. PPG is a non-invasive device that measures the volumetric fluctuations of blood flow using a light source and a sensor at the top layer of skin. Models concerning HRV (Heart Rate Variability) analysis are being studied in various domains, including human emotion recognition (HER). Smartwatches as sensor-based devices play an essential role as photoplethysmographic (PPG) data are frequently evaluated for this assessment. However, the nature of these waves (in terms of additional interruptions) may not always be flawless, even though they are susceptible to many factors, such as motion artifacts, light sources, stress distribution, ethnic background, or circumstances. Here techniques for antique rectification play a significant role &, as a response, impact the outcome. This research proposes a novel data distortions mitigation strategy for improving emotion detection classification efficiency using photoplethysmography waves throughout auditory invitation & a Support Vector Machine (SVM) model. Compared to previously undertaken data using a conventional toolset, i.e.,48.81, the presented scheme provides an improved categorization in trigger sensing, i.e., 68.75 percent. An alternative indicator, such as electroencephalographic activity, could be used in conjunction with PPG for further improvement.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132479084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Antonio García Tadeo, S.Franklin John, Ankan Bhaumik, Rahul Neware, Nagendar Yamsani, Dhiraj Kapila
{"title":"Empirical Analysis of Security Enabled Cloud Computing Strategy Using Artificial Intelligence","authors":"Diego Antonio García Tadeo, S.Franklin John, Ankan Bhaumik, Rahul Neware, Nagendar Yamsani, Dhiraj Kapila","doi":"10.1109/ICCS54944.2021.00024","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00024","url":null,"abstract":"Cloud Computing (CC) has emerged as an on-demand accessible tool in different practical applications such as digital industry, academics, manufacturing, health sector and others. In this paper different security threats faced by CC are discussed with suitable examples. Moreover, an artificial intelligence based security enabled CC is also discussed based on suitable empirical data. It is found that an artificial neural network (ANN) is an effective system to detect the level of risk factors associated with CC along with mitigating those risk issues with appropriate algorithms. Hence, it provides a desired level of protection against cyber attacks, internal confidential threats and external threat of data theft from a cloud computing system. Levenberg–Marquardt (LMBP) algorithms are also found as a significant tool to estimate the level of security performance around a cloud computing system. ANN is used to improve the performance level of data security across a cloud computing network and make it security enabled to ensure a protected data transmission to clients associated with the system.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114845422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}