Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India最新文献
{"title":"Prediction and Validation of Biometric Authentication Security System Using Various Algorithm Tools","authors":"G. Veeresh, Dr. B. Satyanarayana","doi":"10.4108/EAI.7-6-2021.2308868","DOIUrl":"https://doi.org/10.4108/EAI.7-6-2021.2308868","url":null,"abstract":". Ensuring touchy data is vital in this computerized world because of the simple accessibility of vindictive clients. These days, advanced wholesale fraud is on the ascent in the computerized local area. What's more, recognizing and alleviating this sort of work is a test. Biometric verification qualifications assume a significant part in securing most of online business. Confirmation of conventional strategies, for example, IDs and passwords isn't adequate to battle wholesale fraud or security sharing. The responsibility for introductions of the understanding might be effortlessly neglected, speculated, lost, shared or taken. To defeat security penetrates, we should guarantee free exchanges that give security and ease of use in any electronic business. In this paper, a legitimate biometrics ID is introduced. This incorporates highlights, for example, palm printing, finger impression and iris to give a more exact distinguishing proof of the individual. The proposed framework is most appropriate for individual distinguishing proof and requires high security during internet shopping, banking network and so on Each biometric component is tried and the equivalent is under 80%, the client will confirm each secret key in turn. Something else, exchanges can be dropped consequently and security infringement will be diverted to the worker. The proposed biometric framework is exceptionally dependable and secure with the goal that unapproved client access is confined. Particulars map is presented for finger extraction, iris and palm print and different encryption calculation. The framework is executed and tried with various boundaries like precision, productivity, protection, security, unwavering quality and gives the most encouraging outcomes in experiments.","PeriodicalId":422301,"journal":{"name":"Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121213064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Deepak, R. Priya, W. Merline, G. Ramkumar, N. Martin
{"title":"Pythagorean Fuzzy Cognitive Maps in Making Optimal Decisions on Feasible Strategies for Inhibiting Electronic Waste","authors":"L. Deepak, R. Priya, W. Merline, G. Ramkumar, N. Martin","doi":"10.4108/EAI.7-6-2021.2308766","DOIUrl":"https://doi.org/10.4108/EAI.7-6-2021.2308766","url":null,"abstract":". Electronic waste is an emerging cataclysm to the environment in recent times and the mounting industrial sectors are the constant contributors to it. Escalation of technology is being hailed but the environment impacts highly intrudes the resilience of the ecosystem. Refraining from technology is quite not possible in this digital epoch but reclamation of the milieu has high probability. Decision making on inhibiting electronic waste demands feasible strategies and it is the most challenging task for the industrial administrators. This paper proposes the new approach of Pythagorean fuzzy cognitive maps to find the viable strategies of electronic waste inhibition. The representation of the elements of the connection matrix as Pythagorean fuzzy sets is a distinctive feature of the research work. The strategies are subjected to the analysis of the experts to investigate their interrelational impacts. The resultant of the decision making model based on Pythagorean fuzzy cognitive maps is the score value of the strategies based on which they are ranked. This paper also presents the comparative analysis of Pythagorean fuzzy cognitive maps over fuzzy cognitive maps.","PeriodicalId":422301,"journal":{"name":"Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116347434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Smart Vision Based Single Handed Gesture Recognition system using deep neural networks","authors":"R. Suguna, N. Rupavathy, R. Asmetha","doi":"10.4108/EAI.7-6-2021.2308783","DOIUrl":"https://doi.org/10.4108/EAI.7-6-2021.2308783","url":null,"abstract":". The primary and expressive mode of human communications are gestures. Human can interact with machines using body postures and finger pointing. Advancements in human-computer interaction (HCI) has presented new innovations in technology making the users to communicate with computers in an instinctual manner. Evidences clearly state that future living space will be dominated by sensor-based devices and hence an efficient human-computer interfaces are required to exchange information. Hand gesture interfaces have been employed in multiple domains and has won social acceptance. System requirements for gesture recognition vary with the intended application areas. Responsiveness, Learnability, Cost and Accuracy are major drivers for success of hand gesture recognition systems. This paper suggest a HCI design that requires no wearable markers or gloves. A noninvasive vision based framework has been suggested for human-machine interface. Deep Neural Networks have provided promising results in vision based tasks. Convolutional Neural Networks (CNN) are claimed for image recognition problems as they learn features from images gradually and automatically. An optimal CNN architecture has been proposed to recognize single handed gestures. The images of hand gestures convey a numerical representation of ten digits. Image augmentation has been performed to increase the size of training data for deep learning. Depending on application, the interpretation of gesture can be customized. The classification performance has been analyzed with metrics reported by confusion matrix. The proposed architecture performs well both in training and testing reporting the accuracy of 98.2% and 96.2% respectively. Tuning the hyper parameter has improved test accuracy. Hand gesture recognition, Deep Learning, Convolutional Neural Network (CNN).","PeriodicalId":422301,"journal":{"name":"Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116143506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of Internet of Things (IOT) & Its impact on Smart Agriculture Environment","authors":"K. P. Usha, D. Anand, H. Chandrakanth","doi":"10.4108/EAI.7-6-2021.2308614","DOIUrl":"https://doi.org/10.4108/EAI.7-6-2021.2308614","url":null,"abstract":"In the present world scenario, due to global warming and abnormal climate changes there is challenging situation in field of agriculture. This field of Agriculture is the backbone of the Indian economy. The development of agriculture sector in terms of area of land under cultivation, use of modern equipment’s with technology and financial assistance to the grower is absolutely very essential. Numbers of updates in the real-time technologies are coming in agriculture to reduce the production cost and also to improve total productivity. Water is a very important resource in agriculture. We need to focus on new concept to monitor the usage water, manure & human intervention in modern agriculture i.e. Soil testing, Humidity and water regulations etc. The development in Wireless Sensor Networks, the technology made it possible to use it in monitoring agriculture requirements in rural India. In this paper we are focusing mainly on the measurement & monitoring of various parameters like soil moisture, water supply along with humidity and temperature using wireless sensor nodes through internet.","PeriodicalId":422301,"journal":{"name":"Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126284976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classifying shoulder implants in X-ray images using Big data techniques","authors":"M. Sivachandran, Dr. T. Krishnakumar","doi":"10.4108/EAI.7-6-2021.2308636","DOIUrl":"https://doi.org/10.4108/EAI.7-6-2021.2308636","url":null,"abstract":"This research work focuses on optimal solution for the image detection and segmentation. The prosthesis may – a few or numerous years after it was embedded – come needing fix or substitution. In a portion of these cases, the maker and the model of the prosthesis might be obscure to the patients and their essential consideration specialists, for instance when the medical procedure was led in another nation where the patient has presently no admittance to the records. The highest accuracy value is 81.68% which is while applying the=7k=6 and the lowest accuracy value is 65.6% when apply the k=7. The highest precision value is 81.68% while applying the k=1 and very lowest precision value is 73.69% lies on k=2 and k=9.The highest recall value is 83.69% which is produced by while applying the parameter k=6, the lowest recall value is 65.76% while applying the parameter k=9. The K=10 model takes more time to build the model is while applying the k=10 and very low time consumption model is k=8. Another conceivable instance of not knowing the specific producer and model could be expected uncertainty in clinical records or clinical images.","PeriodicalId":422301,"journal":{"name":"Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132078828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cluster Head Based Intrusion Detection System for Black Hole Attacks in Wireless Ad Hoc Networks using 2 Level Fuzzy Logic System","authors":"Christeena Joseph, P. Kishoreraja, R. Baskar","doi":"10.4108/EAI.7-6-2021.2308789","DOIUrl":"https://doi.org/10.4108/EAI.7-6-2021.2308789","url":null,"abstract":". Ad hoc networks are autonomous and infrastructure-less wireless systems where nodes act as routers and hosts. Security is the primary issue for the functionality of these networks. Security for ad hoc networks can be incorporated by prevention and detection mechanisms. This research work focuses on a two-level fuzzy-based intrusion detection system for identifying black hole attacks in ad hoc networks. This method can reduce the complexity of the rule base of the fuzzy inference system. To reduce the complexity of detection, communication overhead and to make the detection scheme energy efficient, further, a cluster-head-based intrusion detection system is designed and implemented. The impact on network performance with no attack, with black hole attack, and with intrusion detection scheme deployed in all nodes and cluster heads are analyzed. The proposed cluster-based 2 level fuzzy logic intrusion detection mechanism was able to achieve the detection rate and accuracy to a maximum of 100%,false alarm rate to 0% and detection delay to in varying attacker scenario.","PeriodicalId":422301,"journal":{"name":"Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134012024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Antonidoss, R. Bhavani, M. Prabha, S. Manju, G. Chinnadurai
{"title":"Smart Identification System on Internet of Things for User Authentication","authors":"A. Antonidoss, R. Bhavani, M. Prabha, S. Manju, G. Chinnadurai","doi":"10.4108/EAI.7-6-2021.2308778","DOIUrl":"https://doi.org/10.4108/EAI.7-6-2021.2308778","url":null,"abstract":". Regarding that, clients agreed on the value of reliable Internet access regardless of location, mode, or time. Individuals can now access a few top-tier administrations through the Internet of Things (IoT), which is a heterogeneous network characterized by machine-to-machine communication. Regardless of how the devices are used to set up the communications, the clients should be considered the true producers of data and purchasers of the yield data. As a result, clients should be viewed as a critical component of IoT; as a result, client distinguishing evidence, verification, and approval are required. In any case, the client Index measure is too perplexing, given the clients' apprehension about sharing their confidential and private information. However, some of their devices should be able to access this personal information. Appropriately, an unbiased method for understanding clients and coping with their personalities is important. Furthermore, the customer plays a minor but significant role in laying the groundwork for the character distinguishing proof and ensuring the consistency of open services. The main goal of this paper is to create a new identity management system (IdMS) for the Internet of Things. The main commitments of this paper are the suggestion of a gadget acknowledgment calculation for client identifiable evidence, the suggestion of a different identifier configuration, and a hypothetical IdMS framework.","PeriodicalId":422301,"journal":{"name":"Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India","volume":"158 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132393640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection of Capacitor Bank Against Switching Transients An Overview","authors":"Vishal V. Vashikar, Prakash","doi":"10.4108/EAI.7-6-2021.2308646","DOIUrl":"https://doi.org/10.4108/EAI.7-6-2021.2308646","url":null,"abstract":". In today’s world, everyone is tried to make the system faster. To make the system faster, power electronics devices play an important role. The normal industry possesses 80% of inductive load and has a lagging power factor. The use of electronic equipment in the system causes power quality disturbances. The electricity demand is increasing day by day and it is necessary to serve power with low losses. To overcome this situation switched capacitors are used in the system. But during the switching of capacitors transients are produced in the system and leads to the failure of power electronic equipment. The proposed paper focused on capacitor bank protection against switching transients.","PeriodicalId":422301,"journal":{"name":"Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Rajath Krishna, D. Nandini, J. A. Mayan, Nehal Veeramachaneni, Nidhi Sawarn
{"title":"Neuromorphic Computing – The Principal of Development","authors":"R. Rajath Krishna, D. Nandini, J. A. Mayan, Nehal Veeramachaneni, Nidhi Sawarn","doi":"10.4108/EAI.7-6-2021.2308573","DOIUrl":"https://doi.org/10.4108/EAI.7-6-2021.2308573","url":null,"abstract":". Due to the subsequent decline of Moore’s Law, everyone is in the search for an approach to push computing technology much further. Neuromorphic Computing is a way through which we can approach the next generation of computer technology. Neuromorphic chips have been the current trending topic as it deals with a diverse range of tactics to formulate the given information to not just make a particular decision but it also modifies the network to memorize the information and finish the work more efficiently. The progress in VLSI mechanics through time and the further research and development on neuromorphic computing lead to a stable growth in the ability and competence of neuromorphic engineering in applications. These chips perform complex tasks such as image recognition, navigation and problem solving. In this paper we present the history, the need for Neuromorphic computing, the functionalities, the current projects, their main features and technical capabilities of Neuromorphic computing.","PeriodicalId":422301,"journal":{"name":"Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124421794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Modern Approach For Analysis Of Manets For Dynamically Changing Network Topologies","authors":"S. Rajesh, Dr. M. Sangeetha","doi":"10.4108/EAI.7-6-2021.2308679","DOIUrl":"https://doi.org/10.4108/EAI.7-6-2021.2308679","url":null,"abstract":". Versatility the board is a significant test in portable impromptu organizations (MANETs) due to a limited extent to the progressively changing organization geographies. For versatile sensor network that are conveyed for reconnaissance application, critical utilize portability the executives plot that can engage hubs to settle on better choices with respect to their positions to such an extent that essential assignments, for example, target following can profit by hub development. In this paper, we portray a disseminated portability the board conspire for versatile sensor organizations. The proposed conspire considers hub development choices as a component of a disseminated advancement issue which coordinates portability upgraded improvement in the nature of target following information with the related unfortunate results of expanded energy utilization because of movement, expected deficiency of organization network, defeat of detecting inclusion..","PeriodicalId":422301,"journal":{"name":"Proceedings of the First International Conference on Computing, Communication and Control System, I3CAC 2021, 7-8 June 2021, Bharath University, Chennai, India","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122901218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}