{"title":"The Nonsplit Resolving Domination Polynomial of a Graph","authors":"N. Pushpa, B. V. Dhananjayamurthy","doi":"10.2991/ahis.k.210913.006","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.006","url":null,"abstract":"Metric representation of a vertex v in a graph G with an ordered subset R = {a1, a2, ... , ak} of vertices of G is the kvector r(v|R) = (d(v, a1), d(v, a2), ... , d(v, ak)), where d(v, a) is the distance between v and a in G. The set R is called a Resolving set of G , if any two distinct vertices of G have distinct representation with respect to R . The cardinality of a minimum resolving in G is called a dimension of G, and is denoted by dim(G). In a graph G = (V, E), A subset D ⊆ V is a nonsplit resolving dominating set of G if it is a resolving, and nonsplit dominating set of G. The minimum cardinality of a nonsplit resolving dominating set of Gis known as a nonsplit resolving domination number of G, and is represented by γnsr(G) . In network reliability domination polynomial has found its application [20], a resolving set has diverse applications which includes verification of network and its discovery, mastermind game, robot navigation, problems of pattern recognition, image processing, optimization and combinatorial search [19]. Here, we are introducing nonsplit resolving domination polynomial of G. Some properties of the nonsplit Resolving domination polynomial of Gare studied and nonsplit resolving domination polynomials of some well-known families of graphs are calculated.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124715792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Communication Protocols for Internet of Things (IoT) Devices: Review","authors":"M. Jamuna, A. Prakash","doi":"10.2991/ahis.k.210913.033","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.033","url":null,"abstract":"Wired and Wireless communication technology for IoT devices play an important role in various applications like transportation, healthcare systems, logistics, personal, social gaming robot, smart environment and city information. The design of low power architecture and development of the protocols is a challenging task for wireless and wired communication in IoT devices. Many communication technologies were used to improve the data rate for IoT communication but the error rate was increased, which reduces the reliability of the system. This paper focuses on various communication protocols for IoT devices. In addition, a comparison is done between different IoT communication protocols with respect to different metrics such as frequency bands, networks, topology, power consumption, data rate etc. The goal of this comparison is to present the guidelines for the researchers which help them to select the right protocol for various IoT applications.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133189209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Shrada, Balakrishna Gudla, K. Chaithra, T. S. Hassini
{"title":"A Deep Learning Approach to Detect COVID-19","authors":"C. Shrada, Balakrishna Gudla, K. Chaithra, T. S. Hassini","doi":"10.2991/ahis.k.210913.032","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.032","url":null,"abstract":"Covid-19 is a viral disease that has been spreading rapidly infects both human beings and animals. The lifestyle of people, their physical and mental well-being and the economic condition of a country are distressingly disturbed due to the viral disease. Recently, vaccines have been prepared for COVID19 which have quite winning results. Yet we are unsure about the long-term effects of the vaccine. In a clinical study of COVID-19 infected patients shows that the covid patients are more likely to be infected from a lung infection after coming in contact with the virus. Chest x-ray (i.e., radiography) and chest computed tomography (CT) are a more effective imaging technique for diagnosing lung related problems. Yet, a significant chest x-ray is a lower cost process in comparison to chest CT. Adding to the previous statement, a chest X-ray helps to identify unusual and abnormal formations of a large variety of chest diseases such as pneumonia, cystic fibrosis, emphysema, cancer, etc. Deep learning is the most successful technique of machine learning, which provides useful analysis that can detect the COVID-19 virus and differentiate between a healthy lung and a virus infected lung successfully. Medical imaging, such as X-rays and CT scans, can aid in the early diagnosis of COVID-19 patients, allowing for more prompt therapy. For prediction, a Convolutional Neural Network (CNN) extracts information from chest x-ray pictures has been done. In order to classify an image as COVID or normal we need to have a segmented target so as to obtain this we use filters so that we can get the edge of the image. Keras Image Data Generator class is used to generate augmented images. Classification is performed with two classes: COVID-19 and","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130943993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Vulnerabilities and Defence Techniques in Aviation Industry","authors":"Shazah Ishtiaq, Nor Azlina Abd Rahman","doi":"10.2991/ahis.k.210913.071","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.071","url":null,"abstract":"‘Aviation’ is referring to transportation of goods via air. The global community is increasing, and people are moving from one place to another in a faster way due to the presence of aviation. As the technology is growing there have been an increase in the cybercrimes as well. The most famous case in the aviation industry is the flight MH370, which was a Malaysian airline travelling normally without any turbulence, disappeared without a trace. The aircraft had 227 passengers boarded including the crew, it is still a mystery which no one could solve. There have been conspiracies that stated that the plane’s auto pilot was hacked. Considering the importance of this case, this research will be focusing on the cybersecurity threats which exists in the aviation industry, it will also present threats which may have caused the disappearance and highlight a plan to overcome vulnerabilities in the critical infrastructure of aviation industry.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129821380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emmanuel O. C. Mkpojiogu, O. E. Okeke-Uzodike, E. I. Emmanuel
{"title":"Quality Attributes for an LMS Cognitive Model for User Experience Design and Evaluation of Learning Management Systems","authors":"Emmanuel O. C. Mkpojiogu, O. E. Okeke-Uzodike, E. I. Emmanuel","doi":"10.2991/ahis.k.210913.029","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.029","url":null,"abstract":"This paper used literature mapping and review protocol to examine associated literature sources with possible relationships that offers hints for the conceptualization of a UX cognitive model for the design and evaluation of learning management system (LMS) products. The mapping review revealed that the cognitive aspects of Bloom’s learning taxonomy can be mapped into the user experience cognitive model for LMS. This model comprises of usability, learnability, understandability, ubiquity, rememberability, safety, trust and epistemic design and evaluation quality criteria. The proposed model is both appropriate for the design and evaluation of the cognitive components of LMS platforms and is therefore recommended for adoption.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128669936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of IoT in Patient Health Monitoring and Healthcare for Hospitals","authors":"Liew Yi Kent, I. F. Kamsin","doi":"10.2991/ahis.k.210913.059","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.059","url":null,"abstract":"Hospitals around the world are facing overcrowding issue especially during the Covid-19 pandemic. IoT devices can be implemented to improve the efficiency at hospitals and reduce risks of doctors getting infected. By implementing IoT, health monitoring can be done remotely, and healthcare provided to patients will be better and timelier. The method used to get the sample for the research is the Stratified sampling method and survey questionnaires will be distributed to collect data from them. A proposed system will then be made to check the feasibility and effectiveness of the system. In the future, the system should improve along with advancements in IoT so everyone will have ease of mind using the system. The aim of this research and proposal is to implement a solution for hospitals to improve health monitoring and provide better and timelier healthcare for patients.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122047307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review on Smart IoT Applications","authors":"Shimon Nathaniel Koshy, I. F. Kamsin, N. Zainal","doi":"10.2991/ahis.k.210913.069","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.069","url":null,"abstract":"","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126097354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting Growth and Trends of COVID-19 by Implementing Machine Learning Algorithms","authors":"D. M. Vistro, M. Farooq, A. Rehman, M. O. Aftab","doi":"10.2991/ahis.k.210913.075","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.075","url":null,"abstract":"Artificial Intelligence has absolutely revolutionized the world in which we live, and with the passing of time it advances exponentially. The applications of AI are tremendous like healthcare and medical solutions, disease diagnostics, agriculture, developing security infrastructures, Autonomous vehicles, intelligent systems, industrial manufacturing, robotics and so much more. COVID19 is a deadly virus that started from china in 2019 and started to spread rapidly and within time spread throughout various countries of world and in 2020 the world went to a huge pandemic and many lives were lost due to this deadly virus causing to a major health hazard. Moreover, in 2021 many countries experience other new forms of the Covid19 that are faster to spread and more deadly. The spread and growth need to me monitored and evaluated to control the spread. The paper states the proposed methodology to evaluate insights of the growth rate or number of cases along with the death rate of COVID19 to getter better visualization to impose lockdown and area evacuation for population safety. We have applying popular Machine Learning algorithms for the forecast of COVID19 including Naive Bayes, Bayes Net, Decision Tree, Random Forest, Logistic Regression. Moreover, the technique will help to evaluate the trend to get better insights for behaviour analysis of COVID19. This study would aid policymakers in taking the required steps in advance, such as preparing isolation wards, ensuring the supply of drugs and paramedical staff, deciding partial or complete lockdown strategies, recruiting volunteers, and developing economic strategies. Out of all techniques, Random Forest algorithm outstands others with the highest accuracy of 87.28% with precision and recall of 89% and 85% respectively.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130097873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ASD Classification in Adolescent and Adult Utilizing Deep Neural Network","authors":"A. Mohanty, Priyadarsan Parida, K. C. Patra","doi":"10.2991/ahis.k.210913.025","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.025","url":null,"abstract":"Autism Spectrum Disorder (ASD) is one of the neurological illnesses affecting the behaviour and communicative skills of an individual. It hampers the recognition capability of an individual. Hence it is the primary responsibility towards the affected individuals with ASD for early detection to minimize its effect. ASD clinical diagnosis procedure is lengthy and expensive. So, against the procedure, ASD datasets are stored in authenticated sites like Kaggle and UCI Machine Learning (ML) repository to carry out clinical research. The data from all the category of individuals including adult, adolescent, child and toddler got collected by a mobile based ASDTest app with certain screening questions. The proposed method covered the category of adolescent and adult datasets with implementation of Landmark Isomap for dimension reduction and then improved Deep Neural Network prediction with classification (iDNNPC) architecture for detecting ASD class. The evaluation of performance parameters confirmed the accomplishment of i-DNNPC classifier model.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127796561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT-based Child Security Monitoring System","authors":"Lai Yi Heng, I. F. Kamsin","doi":"10.2991/ahis.k.210913.058","DOIUrl":"https://doi.org/10.2991/ahis.k.210913.058","url":null,"abstract":"Nowadays, crime rate associated with children keeps increasing due to which draws peoples’ attention regarding child safety. This research is conducted to propose a child security smart band utilizing IoT technology. Online questionnaire and semi-structured interview are methodologies used to collect data. The online questionnaire gains feedbacks by sending questions electronically, where answers need to be submitted online. In the semi structured interview, researcher meets and asks respondents some predetermined questions while other being asked are not planned in advanced. Through information obtained, a smart band have been proposed to monitor the safety of children. By this, parents know what is happening remotely and can take actions if something goes wrong. The future improvements of this device will be adding functions and software to make it works like a phone such as messaging, gallery, Google, YouTube, meanwhile, adding more child security features so that child safety is guaranteed.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127560236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}