N. Sharma, Anubhav Kumar, Pankaj Jha, Divya Saxena
{"title":"Circularly Polarized Triangular-shaped Antenna and modified Inclined-shaped defected ground for Fixed Satellite Communication Applications","authors":"N. Sharma, Anubhav Kumar, Pankaj Jha, Divya Saxena","doi":"10.1109/AISC56616.2023.10085650","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085650","url":null,"abstract":"A circularly polarized compact antenna with resonant frequency at 6.2 GHz is proposed for fixed Satellite communication applications. The impedance bandwidth (IBW) of extends from 6.03 GHz to 6.49 GHz. An elliptical structure is etched from the radiator and the ground is inclined along with a circular stub to perturb the current for circular polarization (CP) with the axial ratio extending from 6.03 GHz to 6.29 GHz, and covers 56.52% of the band.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"59 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114087950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Internet of Things Privacy is Provided Through Object Identification","authors":"Saurabh Lahoti","doi":"10.1109/AISC56616.2023.10085469","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085469","url":null,"abstract":"Cyber security is a critical concern that calls for an in-depth research and finding the sustainable solution. This hypothesis discusses how the Iot (IoT) itself may give protection and increase the efficiency with which we may use the web. While the Internet of Things (IoT) does bring utility, it also raises more worries about cybersecurity. It expands our awareness of how the fundamental components of our day-to-day lives could connect with one another through the internet in order to make our lives simpler. One such assertion that might be made is the idea that turning the internet into a system based on artificial intelligence would truly be a straightforward way to live. We develop a multi-stage design of implication that makes use of flow modeling. This manuscript aims to identify a set of bandwidth (per-device) whose period qualities calculated at numerous time frames (from a moment to an hour) categories the connectivity behavior of various IoT linked devices, as well as their able to operate states (including bootup, vigorously conversing with the consumer, or even being idle); We categorize the web behavior of various IoT device and estimate the trade-off among our approach's cost and effectiveness and we illustrate how our monitoring method operates. We train our algorithms on real-world traffic traces, then evaluate how well they perform utilizing those traces.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114222878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Girthana, S. Swamynathan, A. R. Nirupama, S. Sri Akshya, S. Adhithyan
{"title":"Web-based Pretrained Transformer Model for Scientific Paper Summarization (WPT-SPS)","authors":"K. Girthana, S. Swamynathan, A. R. Nirupama, S. Sri Akshya, S. Adhithyan","doi":"10.1109/AISC56616.2023.10085409","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085409","url":null,"abstract":"The rapid growth of scientific publications becomes challenging for researchers to swiftly learn about breakthroughs in their domains. This challenge is addressed by scientific summarization, which provides summaries of the important contributions of scientific papers. This paper proposes a transfer learning technique for scientific paper summarization to generated abstractive summaries of scientific papers in a particular domain. The proposed model attained improvement of around 12% and 20% than the state-of-the art models such as BART and Longformers.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise Architecture Frameworks for Security Establishment","authors":"Kavita Bhatia, S. Pandey, Vivek Kumar Singh","doi":"10.1109/AISC56616.2023.10085439","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085439","url":null,"abstract":"Transformation is a process that is welcomed by almost all enterprises and Governments in order to make them ready for new challenges. Changing work environment and expectations of the individuals are the main driving forces behind such transformations. However, these changes, considering large enterprises, are not that easy and many times need a total shift in technologies (IT) adopted by them. This shift in technology also brings a shift in the working style of enterprises. Out of various technological requirements, security is considered as paramount importance in order to deliver safe and trustworthy solutions. Currently, the enterprises are practicing security establishments under various arenas viz. Network & Application Firewalls, Anti-Virus Software, Network Proxy, Endpoint Detection & Response, Vulnerability Patching, Intrusion Detection and Protection Systems, Role-Based Access Control, Identity & Access Management, and Secure Operating Environment etc. To establish these security requirements in an enterprise at later stage, require many systems / sub-systems to be implemented bearing a significant cost, efforts, and time. This leads to a need of such an Enterprise Architecture (EA) that keeps all the security requirements of the enterprises ‘right from the inception itself’ by reducing significant cost, efforts etc. with improved security. Various Enterprise Architecture Frameworks (EAFs) are available in the literature to safely and intelligently transform an enterprise/Government from its \"as is\" version to desired level. In this paper, attempts have been made to explore the existing EAFs on the basis of their security considerations at various levels of implementation. Thereafter, strengths and weaknesses of each EAF have been identified and on this basis as well as adoption outcomes, a comparative study of major EAFs has also been accomplished.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121474956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manav Y. Verma, Ashish Kumar, Manan Garg, Sapna Juneja
{"title":"Environment Quality Assessment Web Application","authors":"Manav Y. Verma, Ashish Kumar, Manan Garg, Sapna Juneja","doi":"10.1109/AISC56616.2023.10085252","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085252","url":null,"abstract":"The full form of EQI is the environmental quality index. The three elements which are included in our study are the most precious naturally occurring elements on the Earth i.e., Soil, Water, and Air. These resources though are present in abundant quantity, the quality of these resources varies greatly over a small distance. The health of our body is dependent on these resources. The quality of all these resources must be checked before using them. The results of all these techniques help us to evaluate the quality of soil, water, and air results in single values of AQI, WQI, and SQI. These single values help in easily judging the quality of these natural resources. The quality of these resources helps in both economic and environmental aspects of life. This paper presents a detailed study on AQI, WQI, and SQI and focuses on the factors affecting these values. There is also a focus on precautions from the harmful levels of these factors and what should be done to protect ourselves.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127888456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vinjamuri Lakshmi Priya, A. A, Aditya Chahar, A. A.
{"title":"Artificial Intelligence as a Tool for Enhanced Data Integrity and Data Security","authors":"Vinjamuri Lakshmi Priya, A. A, Aditya Chahar, A. A.","doi":"10.1109/AISC56616.2023.10085250","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085250","url":null,"abstract":"The present era of \"big data analytics and management\" requires a robust and impenetrable system to deal with the issues of data integrity and security. If data is altered or deleted without sufficient audit trails, a corporation loses its most valuable asset. This has major repercussions on the use of available data and the conclusions drawn from such use. It is commonly said that \"data is money\" and that such information is crucial to the success of any business. For this reason, it is crucial to ensure that data is stored safely and securely. This is true no matter what sector a firm resides in.Hence, data management requires a solution that can guarantee simultaneously the security and integrity of data, as both are administratively intertwined for enforcement.The present article is an attempt at identifying the various sectors in general where in the tools of Artificial intelligence AI, contributes towards an effective data integrity and security as also on the lacunae and missing aspects that have to be addressed to overcome the hindrances in the use of AI tools.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127914986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Discrete Wavelet Transform: A breakthrough in segmentation of CT scans for Intracranial Hemorrhages","authors":"H. Saifuddin, H. C. Vijayalakshmi, R. J","doi":"10.1109/AISC56616.2023.10085384","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085384","url":null,"abstract":"Head injury is a major source for grimness and mortality worldwide and traumatic head wounds are a main source of neurological disability. Head wounds might go from a basic knock on the head to a skull crack and may cause cerebral harm and may even result in death. A traumatic brain injury happens when the skull is harmed, either due to an accident or an injury. This causes the blood to coagulate outside the brain matter within the skull or inside the brain matter itself which is recognized as Intracranial Haemorrhage. This is easily diagnosed using a CT scan of the brain. However, the CT scans may vary in complexity. To address the complexity of the brain CT images, this research paper suggests a method of intracranial Haemorrhage segmentation using discrete wavelet transform. The proposed method is based on a wavelet family used to help in extracting regions of Intracranial haemorrhages in the gray scale images and further applying morphological operations to denoise the image for better segmentation of the Haemorrhage. The proposed algorithm has achieved an Intersection Over Union Score of 78% and is tested on publicly available Kaggle’s Computed Tomography CT dataset to verify the segmented region.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115848978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"American Sign Language Interpreter: A Bridge Between the Two Worlds","authors":"K. Sood, Bhargav Navdiya, Anthony Hernandez","doi":"10.1109/AISC56616.2023.10085066","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085066","url":null,"abstract":"American Sign Language (ASL) is the third most commonly used language after English and Spanish. In this work, we build an image classification modeling technique for ASL to abridge the gap between native ASL speakers including children and others. This paper focuses on providing a sign language recognition system using machine learning. We use four conventional machine learning techniques: K-nearest neighbor, Naive Bayes, Logistic Regression, and Random Forest to detect the alphabets from the images made available using an existing dataset and a new dataset that we generate for this work. Our technique identifies images based on the grayscale values, to identify the same sign in different environments such as images captured in different illuminated environments or hand signs placed at different places compared to the image in the dataset, or hand signs with diverse backgrounds. We use an existing dataset and a real-world dataset that we create independently by generating images using an HP webcam using a computer vision library. We use supervised machine learning and train the classifiers using the labeled image data to predict the ASL signed alphabet in the new image. Our analysis indicates that K-Nearest Neighbor performs best with both datasets achieving up to 99% accuracy.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. A, Richa Mishra, B. Alfurhood, Peeyush Vats, Sushant Waghmare, Kumud Pant
{"title":"Development of hybrid technology using Machine Learning and Block chain Technology to prevent from COVID 19 through the proper information gathering","authors":"J. A, Richa Mishra, B. Alfurhood, Peeyush Vats, Sushant Waghmare, Kumud Pant","doi":"10.1109/AISC56616.2023.10085413","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085413","url":null,"abstract":"Blockchain and artificial intelligence (AI) have shown promise in combating the Covid epidemic. Blockchain in particular may aid in early detection to fight pandemics. The methods established for infection prevention include the use of face masks, public isolation within a 6 metre radius, regular check-ups, and two doses of vaccinations.This system has features for detecting masks, people, temperature, information tracking, in-person interactions, and a person's medical history. Diseases might be monitored and their spread contained with the advancement of technology and the rise in smartphone use. Because additional economic sectors are opening up and because Covid is still spreading widely, adhering to the guidelines is more important than ever for avoiding infection.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130085416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shweta Pandey, A. Dixit, Rajesh Singh, A. Gehlot, Namrata Kathuria, Samta Kathuria
{"title":"Artificial Intelligence-Based System for Advocate Assistance","authors":"Shweta Pandey, A. Dixit, Rajesh Singh, A. Gehlot, Namrata Kathuria, Samta Kathuria","doi":"10.1109/AISC56616.2023.10084951","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10084951","url":null,"abstract":"India experienced it through the Digital Revolution several years ago; however, technology has never drastically altered other facets of society. This study is significant because if legal research is deficient, the implications of AI & Edge Devices to assist Advocates as legal rights which directly beneficial to the legal phenomenon. By implementing automation in lower courts, the judiciary may be able to overcome some of the substantial difficulties brought along by arrears, caseloads, delays, client interaction, etc. Although: there are many facets to these problems, improvements in increased performance, coherence, transparency, & speed that coming innovations of Industry 4.0 might offer might greatly enhance and relieve problems to retrieve this problem Edge Device can assist the advocate, This AI-based device is an innovative one which is connected to the database. In the Advocate office, the client come to the Office this system talks to the client & listens to the whole facts and circumstances of the case & this device tells the relevant Act which would be applicable in the related case and also provide a printed copy This study signifies the impact, outcome coming out of the device is effective and how this device functions under the legal system.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134255035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}