B. R. Krishna, M. H. Reddy, P. Vaishnavi, S. Reddy
{"title":"Traffic Flow Forecast using Time Series Analysis based on Machine Learning","authors":"B. R. Krishna, M. H. Reddy, P. Vaishnavi, S. Reddy","doi":"10.1109/ICCMC53470.2022.9753812","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753812","url":null,"abstract":"Intelligent Transportation System’s (ITS) main aim is to provide advanced services in both the transportation and traffic fields. A wide variety of algorithms and different types of models are being used for the estimation of short-term traffic flow. These algorithms works based on time series prediction and machine learning techniques for achieving improved results. Most of these models, on the other hand, require the historical data as continuous input, thus making it difficult to automatically find the best time delays. Our proposed study recommends a model \"Long Short-Term Memory Recurrent Neural Network (LSTM RNN)\" that employs the memory block's based on three multiplicative units to dynamically select the best time delays. The Performance Measurement System (PeMS) dataset is used for building this model that is then compared to other models like Random Walk (RW) and Support Vector Machine (SVM), one layer Feed Forward Neural Network (FFNN) and Stacking Auto Encoder (SAE). Based on the results it is observed that the proposed model gives better predictions than the other models and the same is measured in terms of accuracy.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"24 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131172220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sandesh Jain, Sarthak Pruthi, Vivek Yadav, K. Sharma
{"title":"Penetration Testing of Wireless EncryptionProtocols","authors":"Sandesh Jain, Sarthak Pruthi, Vivek Yadav, K. Sharma","doi":"10.1109/ICCMC53470.2022.9754042","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9754042","url":null,"abstract":"Due to its flexibility, portability, and simplicity of accessibility, the use of wireless networks as a communication medium has skyrocketed. As more devices join a wireless network, valuable and sensitive data is sent over the air between users, making it easy for attackers to sniff and seize data packets. The goal of this work is to use penetration testing to identify weaknesses in the WEP, WPA, and 802.11i WPA2 security protocols, as well as to conduct attacks against them being anonymous with the use of macchanger script. Kali Linux and its Aircrack-ng tools were used to perform penetration testing in WEP & exploited a 4-way handshake for WPA/WPA2.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"42 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131204244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Sports Competition Information Issuing System Based on Fuzzy Website Generation System","authors":"Yingda Li","doi":"10.1109/ICCMC53470.2022.9753936","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753936","url":null,"abstract":"Aiming at the problems of inconsistency of format, incompatibility of information release software, duplication of development work and other issues in the information release of various competitions, this paper designs and develops a general information release system for sports competitions. Through the fuzzy website generation system, the individual competitions can be completed. Design of information release system. The software design of the system is based on the BS architecture, and a large number of grouping rule tables are built-in for regular games, which can give the best grouping in most cases. The dynamic expression analysis function in the scoring algorithm basically covers all numerical calculation scoring competition systems.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133036758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications of Machine Learning in Rheumatoid Arthritis - An Insight","authors":"Ganeshbabu K, I. M.","doi":"10.1109/ICCMC53470.2022.9753705","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753705","url":null,"abstract":"This paper deals with the review of different data mining and machine learning approaches engaged for the study of Rheumatoid Arthritis (RA). RA is a constant illness that affects the joints located in the fingers, knees, and feet. It is a kind of chronic inflammatory disease that causes severe sickness. In the era of machine learning applications, they lead to some technological as well as clinical advancement for the arthritis diagnosis, prediction, and prognosis of auto immune rheumatoid arthritis. This study provides some vital analysis of the machine learning techniques that are presently practiced in the analysis of medical data for RA and how it is used in the drug development, target identification drug repurposing and delivery.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128836309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention of Fake Food and Adulteration using Electronic Product Code (EPC) and Machine Learning based Block Chain Technology","authors":"Narayanan. A. E, Arivunila. M, S. A, A. P","doi":"10.1109/ICCMC53470.2022.9753910","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753910","url":null,"abstract":"Block chain is a widely dispersed huge technology in which transactions are recorded and preserved, compromising them with the built-in cryptographic generation. Recent studies have focused on the critical principle of Block chain and how it may be used in areas such as data protection change, food safety, product growth, and business acceleration in all retail establishments. The approach includes genuine features in security architecture to prevent low levels and counterfeit medications. Even at the level of individual stocks, Block chain will ensure compliance with the acquisition of any goods by improving evidence of ownership through the use of particular sources. The strategy includes genuine variables inside the security systems to prevent low-tier and counterfeit pharmaceuticals. Even at the level of individual stocks, Block chain will ensure compliance with the acquisition of any goods by strengthening evidence of ownership via the use of unique sources. Because every time a product changes hands, transactions can be recorded and verified using a unique ID known as the EPC code, which is issued remotely using FSSAI, from its production to sales, and is clearly called Block chain. it does not change, it provides consistency and meaning. When the block is finished, generate a fully unique code that binds to the next page or inhibits the appearance of a series of blocks. Because the concept is entirely based on a reliable cryptographic hash algorithm, the transaction cannot be copied or encrypted, copies are equivalent, and minimal authorization is required to gain access to the data. This will significantly eliminate human errors, additional expenses, and time delays and might be a global procurement application. The suggested system uses the K- Nearest Neighbour algorithm to monitor food production from farmers through distributors, who then sell it to customers. Expired stock can be reclaimed and redistributed after special authorization by bodies. Notify customers regarding product performance as well. FSSAI provides the EPC code, which may be found in every product from manufacture to wholesaler to retailer. The code contains all the information about the goods, so when the customer types the code into the programme, all information about that specific product can be obtained.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127804228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Taufiq Al Hasib Sadi, Md. Ishtiaq Kadir, Md. Shiblee Rahman, Mohammad Monirujjaman Khan
{"title":"Development of a Voice Controlled Web based E-Commerce","authors":"Md. Taufiq Al Hasib Sadi, Md. Ishtiaq Kadir, Md. Shiblee Rahman, Mohammad Monirujjaman Khan","doi":"10.1109/ICCMC53470.2022.9753691","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753691","url":null,"abstract":"People's lives have changed as computers and their voice control systems have advanced. The voice recognition system helps users to be hands free and supplies the user with exact responses. It became possible because of many years of research on machine learning and voice control systems. The efficiency and other benefits are the many years of research which also helps to develop person-to-person and human-to-machine interconnections in many ways. Visual disabled users are unable to explore the whole service of these great advanced applications. A voice control system can make various web applications easier for common users. The user can get the details of their products easily by using the voice service. However, the primary goal of developing a voice control system is to assist people with autism, deafness, blindness, and other disabilities who are unable to use their hands. As a result, this voice control technology is created to help them overcome their obstacles. This paper presents a voice control e-commerce application. Demonstrating the usefulness of the SRS taxonomy and gifting a speech-oriented ordered goods purchase online business functionality utilizing IBM's STT has been proposed. This voice control tool will make people's lives easier by allowing them to use it in a range of circumstances, such as text content and government applications. It can also be utilized on any web platform.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115187896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Probability Optimization Model in Advanced Mathematics in Data Mining","authors":"Aijun Zheng","doi":"10.1109/ICCMC53470.2022.9753752","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753752","url":null,"abstract":"With the continuous deepening of education informatization, the advanced mathematics auxiliary teaching system has been gradually put into use, but from the perspective of the existing advanced mathematics auxiliary teaching system functions, the significance and function of the application of over-analysis probability thought in advanced mathematics will be further analyzed. Probabilistic thinking methods to solve problems. Based on this, this article first explains the importance of designing advanced mathematics data mining system based on probability optimization model, and proposes the design process of advanced mathematics auxiliary teaching system based on data mining from different directions.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115196877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Deep Neural Learning Classifier for Brain Tumor Detection","authors":"S. Kurian, S. Juliet","doi":"10.1109/ICCMC53470.2022.9754022","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9754022","url":null,"abstract":"Magnetic Resonance Imaging (MRI) is a scanning method which captures the anatomy and processes of human body. MRI images are significant for premature recognition of brain cancer. Thus, predicting the brain cancer disease from an MRI scan is not an easy process, because of its complexity and tumor variance. In order to address these problems, Guassian Preprocessed Projection Pursuit Regressive Mathieu Feature Extraction based Deep Neural Learning (GPPPRMFE-DNL) is introduced. GPPPRMFE-DNL Model is proposed for accurate brain tumor detection process in a short time. Gaussian smoothing filter is employed in GPPPRMFE-DNL Model to eradicate the noisy pixels from input image. Subsequently, skull stripping procedure is used for collecting brain tissue from neighbouring region. Then, the image achieved is used for dividing within the segments, to minimize the dimension of input image. Feature extraction is performed to extract the color, texture, and intensity features from the segmented region. Finally, the classification task is performed with the help of logistic activation function between the testing and training image with higher accuracy and lesser error rate. At last, the outcome is determined by an output layer. The observed results show a better analysis of GPPPRMFE-DNL, compared with the two conventional methods.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115914861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Gladence, Sangeetha K K, S. S, R. S, Mercy Paul Selvan
{"title":"Smart Home Monitoring System and Prediction of Power Consumption","authors":"L. Gladence, Sangeetha K K, S. S, R. S, Mercy Paul Selvan","doi":"10.1109/ICCMC53470.2022.9753722","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753722","url":null,"abstract":"Automation is a popular topic in the twenty-first century, and it has become an indispensable part of everyday life. Human labor, time, work, and some human errors are all eliminated under automation. And also many natural resources are on the verge of Renewable energy sources that have not yet achieved the point of total self-sufficiency are now in danger. In this situation, energy efficiency and appropriate power sharing are essential. In this article, we employed the smart meter concept to continuously monitor energy usage and warn the consumer when it surpasses a specified threshold. A customized Mobile Application and hardware module are created to measure the energy used by each item in a home, estimate the monthly electricity bill, and anticipate power usage for future dates. In this method, the user could now create a preferred bill, and when the electricity use reaches the specified threshold, it will be notified via application.This system furthermore employs a technology to establish a connected device's tracking rate, making it an energy-efficient tool in and of itself. A current sensor, Voltage sensor and a Micro - controller was used to operate the hardware components.The software application was created to keep track of electricity costs. The system uses current data to forecast meter readings for the coming months. and predicts the electricity usage based on their power consumption.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114801868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chimp Optimization Algorithm based Energy Aware Secure Routing Protocol for Wireless Sensor Networks","authors":"P. Manjula, S. Baghavathi Priya","doi":"10.1109/ICCMC53470.2022.9753826","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753826","url":null,"abstract":"Wireless sensor network (WSN) comprises a massive collection of inexpensive, smart, and compact sensor nodes for data collection and tracking applications in real time. Availability of limited energy and security are considered as the major issues in the WSN. One of the most common energy efficient solutions for WSN is the routing protocol. Since the data transmission in WSN takes place in wireless links, security becomes a major issue and secure routing protocols need to be designed. In this aspect, this study develops a Chimp Optimization Algorithm based Energy Aware Secure Routing Protocol (COA-EASRP) for WSN. The proposed COA-EASRP technique mainly focuses to derive optimal routes in WSN and thereby accomplishes security. In addition, the COA-EASRP technique has derived an objective functioning involving different parameters namely energy, trust, and delay. The route with maximum energy and trust with minimal delay will be chosen as optimal route by the COA-EASRP technique. In order to demonstrate the enhanced outcomes of the COA-EASRP approach, a series of simulations are implemented and the outcomes are examined in different metrics. The extensive comparative study reported the supremacy of the COA-EASRP technique compared to recent approaches.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114896807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}