{"title":"Artificial Intelligence as a facilitator for Film Production Process","authors":"Hardeep Singh, Kamaljeet Kaur, Preet Pinder Singh","doi":"10.1109/AISC56616.2023.10085082","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085082","url":null,"abstract":"The development of artificial intelligence (AI) has made it an increasingly important part of film production. The use of AI associated with ML has the potential to completely revolutionise the filmmaking process. The purpose of this research is to examine and synthesise the present state of AI in film production. From pre-production until the film's release, AI has been helpful to the production crew at every stage. This study provides a concise overview of the many stages of the filmmaking process—from pre-production, and post-production to broadcasting—where AI has been widely implemented. We also conducted a survey, using a questionnaire to gauge current and future interest in AI's role in the filmmaking process. The findings demonstrate that using AI in the film industry can enhance the calibre of production and guarantee more earnings at the box office.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133895936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction and Analysis of Heart Attack using Various Machine Learning Algorithms","authors":"Ochin Sharma","doi":"10.1109/AISC56616.2023.10085460","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085460","url":null,"abstract":"The healthcare industry is typically thought of as \"information rich\" yet \"knowledge poor.\" The healthcare systems include a vast amount of data. However, the lack of efficient analysis tools makes the employability challenging to uncover hidden linkages and patterns in the data. In the business and scientific realms, data mining and information retrieval have various applications. The use of data mining methods in the health service can produce insightful information. The possible applications for rule based, tree structure, Bayesian networks, and artificial neural networks classification are briefly discussed in this research based data mining approaches to a large volume of healthcare data. Huge amounts of healthcare data are gathered by the industry, but they are regrettably not \"mined\" to find hidden information. Heart attack is a primary causes of unexpected mortality, especially in women, heart attack prediction is crucial in nations with low incomes. Despite using common clinical techniques like electrocardiography and the research goal is to identify the finest machine learning algorithm for predicting heart attacks.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133634527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Raman, Zatin Gupta, Akanksha Gupta, S. Akram, Dimple Saini, J. Bhalani
{"title":"Internet-Of-Things Wireless Communication with a Focus on the Protection of User Privacy and the Delivery of Relevant Facts","authors":"R. Raman, Zatin Gupta, Akanksha Gupta, S. Akram, Dimple Saini, J. Bhalani","doi":"10.1109/AISC56616.2023.10084975","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10084975","url":null,"abstract":"With the present and future Internet architecture, the concept of the Internet of Objects foresees the ubiquitous networking and collaboration of smart things. One definition of the Internet of Things (IoT) is basically the expansion of the Internet into the physical world. It paves the way for a plethora of supplementary items that will enhance people's day-to-day lifestyles, generate new enterprises, and transform structures, cities, and effective transportation. There is no question that smart gadgets make pervasive data collection or monitoring possible; nevertheless, same advantageous qualities also pose privacy issues, which are now keeping the Internet of Things from reaching its maximum capabilities. These threats bring forth new challenges, such as devising means to monitor or stop pervasive monitoring and profiling or managing the security of personal information management systems. These are only two examples. In this essay, we present an in-depth investigation of the problems about privacy that are raised by the Internet of Things. First, we will discuss these increasing characteristics and trends of the Internet of Things in order to assess the consequences they have for users' privacy later on. Furthermore, we provide a categorization of privacy issues and an analysis of them in this new setting, drawing attention to the hurdles that must be overcome before the Internet can be a possibility.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130825344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud of Things and Blockchain Integration: Architecture, Applications, and Challenges","authors":"Rahul Mishra","doi":"10.1109/AISC56616.2023.10084991","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10084991","url":null,"abstract":"The use of Blockchain technology is rapidly expanding. Blockchain’s autonomous, transparent, and secure properties will assist the next generation of varied industrial applications. Cloud technology and indeed the Iot Cloud from the Internet - Of - things Corporation are two examples (IoT). Here, blockchain offers novel approaches to Cloud of Things' difficulties with decentralization, privacy regulations, including traffic analysis, while Cloud of Things improves to the efficiency of blockchain operations with its flexibility and scalability. Since the BCoT model is an innovative paradigm that brings together digital currency and the Internet of Things, it has the potential to facilitate a broad variety of use cases. The purpose of this article is to introduce the BCoT from the several perspectives, including its background, justification, and integrated design, by presenting a state-ofthe-art assessment of BCoT integration. Further, we provide an in-depth evaluation of BCoT applications, discussing their potential in 5G technology and beyond, in addition to their specific use-case sectors. In order to help researchers and app creators locate and stay up with the most latest technologies in this rapidly growing market, we provide an in-depth review of the new BCoT tools and services.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116944755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Breast Cancer Detection for Histopathology Images Using Deep Learning","authors":"Eliganti Ramalakshmi, L. Gunisetti, L. Sumalatha","doi":"10.1109/AISC56616.2023.10085116","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085116","url":null,"abstract":"A prevalent and deadly kind of cancer in women is breast cancer. The likelihood of surviving breast cancer may rise if it is detected early. Breast cancer diagnosis and treatment are greatly aided by breast histopathology image analysis. This results to the development of efficient Deep Learning algorithms in this field, which helps histopathologists achieve successful analytical results. This research presents an overview of methodologies for deep learning-based image analysis of breast histopathology. Histopathology image datasets that are frequently utilized like BreaKHis, MITOS dataset, Camelyon etc. are analysed. Finally, various performance metrics for assessing the effectiveness of breast cancer prediction algorithms are presented. The purpose is to review current deep learning models for detection and classification of breast cancer using histopathological images.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131013892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake Information Detection Using Deep Learning Methods: A Survey","authors":"Pummy Dhiman, Amandeep Kaur, Anupam Bonkra","doi":"10.1109/AISC56616.2023.10085519","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085519","url":null,"abstract":"Fake content has always existed, even before the internet was founded. Because social media is free to use and accessible, a great deal of information is shared on these sites. These platforms play a significant role in the dissemination of information, whether accurate or false. The unregulated proliferation of fake information creation and dissemination that we've seen in recent years poses a constant threat to democracy. Fake content articles have the power to persuade individuals, leaving them perplexed. Deep learning techniques are extremely useful for detecting fake information. This paper analyses multiple DL techniques and datasets used by different researchers for analysis that aids in the detection of bogus information.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131226302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fraud Detection in Financial Domain using Machine Learning","authors":"Nilotpal Pathak, Swasti Singhal","doi":"10.1109/AISC56616.2023.10085181","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085181","url":null,"abstract":"Digital fraud has become a menace in every industry. It is critical for any firm to have a concentrated focus on detecting and preventing fraudulent activities. Security is a priority. The way we communicate has changed dramatically as a result of digitization. A simple click of a mouse, complete our day-to-day transactions. On the other hand, it has created concerns from swindlers who take advantage of absent protections in current financial systems and mimic real customers, undertake time-consuming transactions on their behalf that result in a profit causing financial setbacks to the organizations and customers. Organizations will need to pay attention as a result of this. Its brand value is also affected. Organizations have learned from their mistakes. To prevent fraud and keep ahead of the criminals, it is necessary to maintain a constant focus. It’s critical to keep an eye on major trends. We might be able to tell the difference between a legitimate and a fraudulent transaction, obtaining customer data such as geolocation, authentication, and so on, it is possible to keep track of the device’s IP address during the session. Machine Learning (ML) will assume a significant part in the future in identifying examples of such frauds consequently. We use algorithms like decision trees, XGBoost, K-NN and others to find an optimal solution for our concerning project.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shweta Pandey, A. Gehlot, A. Dixit, Samta Kathuria, Rajesh Singh
{"title":"Right To Health of Differently-Abled People-Technology Intervention","authors":"Shweta Pandey, A. Gehlot, A. Dixit, Samta Kathuria, Rajesh Singh","doi":"10.1109/AISC56616.2023.10085642","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085642","url":null,"abstract":"We are living through a current frontier of communication, one that will drastically alter how people live in today's society. The Internet of Objects (IoT), an entirely new adaptive networking that would enable new ways to interact between people, things, and indeed the environment, is also being established in an era where all things will be connected via the internet. The Internet of Things (IoT), sensors, cloud computing, smart homes & virtual reality could all be used to protect the right to good health, which is a core issue for persons with disabilities during their later years of life. A journey in disabled health is currently being formed by high tech, defending their rights. The new research analyses the relevance of technology, namely IoT and sensors, and examines how it is applied to differently-abled behaviors, diagnosing, and inspections. Accordingly, the study reviews the framework developed via earlier research for different ables smart health. To uphold their privileges, the paper highlights how these technologies could serve disabled persons & how they should be actively used in their smart health.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132874791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stock Market Prediction Approach: An Analysis","authors":"Maya Joshi, Gaurav Goel","doi":"10.1109/AISC56616.2023.10085262","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085262","url":null,"abstract":"Data mining is a method that can glean meaningful information from a wealth of data. The data mining method known as prediction analysis uses current data to forecast potential future outcomes. Pre-processing the image, to extract the features, and classify the image are just a few of the operations used in the prediction analysis methodology. The stock market forecast is the foundation of this review essay. This study reviews a number of classification-based stock market prediction systems. Python is used to put the stock market forecasting concepts into practice.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128367298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Dangi, Gaikwad Anil Pandurang, Gayatri Vijayendra Bachhav, M. Chakravarthi, A. Gehlot, Surendra Kumar Shukla
{"title":"Blockchain Applications for Security Issues and Challenges in IOT","authors":"A. Dangi, Gaikwad Anil Pandurang, Gayatri Vijayendra Bachhav, M. Chakravarthi, A. Gehlot, Surendra Kumar Shukla","doi":"10.1109/AISC56616.2023.10085201","DOIUrl":"https://doi.org/10.1109/AISC56616.2023.10085201","url":null,"abstract":"A common network image (COP) across the numerous applications of contemporary life was made possible by the internet with things (IoT). The development of wireless sensor network devices, which allowed data to be exchanged and numerous analyses to be carried out, allowed for the achievement of the COP. IoT raises security and privacy issues since data authentication and exchange are handled only via the central server. There might be a possibility of device spoofing, incorrect authentication, and decreased data exchange dependability. A central server’s model is dropped and cryptocurrency (BC) technology is added as a component of IoT to solve similar confidentiality and security problems. This study examines how the distributed ledgers based on block chain (DL-BC) technology contributes to potential security and privacy concerns in the context of IoT component interaction. Application of BC with regard to the targeted industries and categories were obviously examined here. To comprehend the role of blockchain technology, certain issues unique to IoT and IoT using BC also were explored.","PeriodicalId":408520,"journal":{"name":"2023 International Conference on Artificial Intelligence and Smart Communication (AISC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131979715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}