M. Roobini, S. Srividhya, Sugnaya, Kannekanti Vennela, G. Nikhila
{"title":"Detection of SQL Injection Attack Using Adaptive Deep Forest","authors":"M. Roobini, S. Srividhya, Sugnaya, Kannekanti Vennela, G. Nikhila","doi":"10.1109/IC3IOT53935.2022.9767878","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767878","url":null,"abstract":"Injection attack is one of the best 10 security dangers declared by OWASP. SQL infusion is one of the main types of attack. In light of their assorted and quick nature, SQL injection can detrimentally affect the line, prompting broken and public data on the site. Therefore, this article presents a profound woodland-based technique for recognizing complex SQL attacks. Research shows that the methodology we use resolves the issue of expanding and debasing the first condition of the woodland. We are currently presenting the AdaBoost profound timberland-based calculation, which utilizes a blunder level to refresh the heaviness of everything in the classification. At the end of the day, various loads are given during the studio as per the effect of the outcomes on various things. Our model can change the size of the tree quickly and take care of numerous issues to stay away from issues. The aftereffects of the review show that the proposed technique performs better compared to the old machine preparing strategy and progressed preparing technique.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"236 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114995504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. V, Magesh K, Selvanarayanan A, Keertheshwaran G
{"title":"E-Canteen Management System based on Web Application","authors":"L. V, Magesh K, Selvanarayanan A, Keertheshwaran G","doi":"10.1109/IC3IOT53935.2022.9767984","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767984","url":null,"abstract":"We have been observing that in many canteens/mess/cafeteria in all Institution like educational, IT Sectors and Factories are experiencing huge crowds during peak hours. Due to this there was prolonged queue in the billing as well as delivery place, this ultimately leads to wastage of time and human errors in accounting‥. To overcome this problem, we came with a solution Online food ordering in the particular café using our web application. In our application any Registered Person can able to view and place their food orders prior to their break time with facilitation of online payments. The user can select a particular slot on which he/she willing to take deliveryof the food. The time spent on Queue will be reduced, the food shortage can be minimized and human errors in accounting as well.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115732516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perceived Stress Prediction among Employees using Machine Learning techniques","authors":"L. Mohan, Gopinadh Panuganti","doi":"10.1109/IC3IOT53935.2022.9768026","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9768026","url":null,"abstract":"Stress is an overworked emotion that can arise from a multitude of factors in our daily lives. It has produced a potentially dangerous scenario for employee mental health throughout the world. To treat and minimize the consequences of stress, there must first be a reliable and reproducible technique for determining the degree of stress being experienced. To date, there have been limited studies to quantify individual stress levels beyond self-reporting by EEG, ECG, questionnaires, and other methods. All of these approaches have an issue with estimating stress accurately. As a result, this inspired me to concentrate on a better understanding of employee stress. In this research, we used the Perceived Stress Scale (PSS) technique for stress prediction. The motivation for using the PSS technique is, an easy-to-use questionnaire with well-established psychometric traits, in which the questions are prioritized using a weighted average approach, and PSS scores are computed by inverting responses, which improves the accuracy even further. In this process, we have collected the data from 251 employees via a questionnaire and used Exploratory Data Analysis (EDA) to visualize the data. According to the results of this study that used the Random Forest, Logistic Regression, and SVM techniques, only about 9.6% of employees are stress-free. From the experimental findings, the logistic regression method gives the highest prediction accuracy of 99 percent.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116973698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Jaundice Detection in Neonates Using Image Processing","authors":"K. Srividya, K. Renganathan, M. S, Y. U","doi":"10.1109/IC3IOT53935.2022.9767938","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767938","url":null,"abstract":"This study aims a mobile support system to aid health care professionals in hospitals or in regions far away from hospitals to utilize noninvasive image processing methods for classification of neonatal jaundice, Because of an increase in bilirubin levels, which causes a yellowish discoloration of the skin in neonates, jaundice could develop during the first week of life. Because bilirubin is present in the nervous systems, extreme jaundice and hazardous amounts of bilirubin can induce brain damage. The most efficient method for the measurement of bilirubin is by non-invasive blood sampling, but it is uncomfortable for the baby, and it can cause loss of blood and anemia, particularly if multiple blood tests are needed. Blood testing also put the baby at danger of illness. Furthermore, because the findings of intrusive testing are not instantaneous, they take time. This research presents a new system for jaundice identification differences in skin color analysis in attempt to face all of the concerns mentioned previously. Because it is inexpensive, objective, ubiquitous, and less unpleasant to newborns. The proposed system uses a digicam as a color-based screening tool. Jaundice was discovered and estimated to use the analysis derived from the images, opening the way for more case studies in medical applications, particularly in diagnosis, health monitoring, and active therapy.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127064642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Smart Therapeutic Device for Insomnia","authors":"V. S, R. R, B. S., P. M, J. P","doi":"10.1109/IC3IOT53935.2022.9767998","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767998","url":null,"abstract":"Insomnia deprives of energy level for good mood that badly influence health, work performance, and quality of life. Music holds upon the physical, mental, and emotional stage, which might also explain anecdotal reviews of its success as a regular sleep aid. The smart therapeutic device for insomnia helps the patients to sleep with help of time-scheduled music if sleeplessness is experienced. Also, the EEG feedback from the analysis of the cap helps to regulate other features including the volume of the music. Further, it helps the patient to create, regulate and maintain a sleep schedule and diagnose sleep abnormalities. Also, the proposed system helps people to enjoy better sleep. In this device, an algorithm is developed which plays the music from the pre-recorded playlist of sounds, or favourite music. The music sound and volume are adjusted automatically according to the state of mind of our subject i.e. when the brain chooses activity at past bedtime the music starts and it will not stop until the subject is partially or fully asleep. This whole process is designed to come to the subject's mind and distract from other forces and help to sleep. The proposed system employs an intelligent technique for analyzing sleep patterns which is not previously used in research work.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127435489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Facial Detection Attendance System using LBPH and KNN","authors":"R. Valarmathi, R. Uma, Brinda C, Vashika R","doi":"10.1109/IC3IOT53935.2022.9767943","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767943","url":null,"abstract":"Present procedure for marking attendance is exhausting and prolonged so this paper is consequently put forward to challenge all these complications. This paper hence evolve a model to distinguish each personality's face from a seized image using a set of conditions i.e. LOCAL BINARY PATTERN HISTOGRAM algorithm to track the student attendance. The overall working of this local binary pattern histogram algorithm was, first the image is divided into m*m grids. For each grid histogram is calculated in order to easily recognize the spatial features. After calculating binary pattern histogram for each cell. The results were coupled to obtain the final feature vector. This final vector is compared with vectors in the training data set using K-Nearest Neighbor's algorithm. By this algorithm the value which is closest to our final vector is obtained as a result of classification. After receiving the name of the person, the attendance of the particular person is updated in the database. This proposed algorithm decreases the work load and records routine performance of maintaining each student and further makes it easy to note the attendance.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125353261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Saranya, N. Archana, J. Reshma, S. Sangeetha, M. Varalakshmi
{"title":"OBJECT DETECTION AND LANE CHANGING FOR SELF DRIVING CAR USING CNN","authors":"M. Saranya, N. Archana, J. Reshma, S. Sangeetha, M. Varalakshmi","doi":"10.1109/IC3IOT53935.2022.9767882","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767882","url":null,"abstract":"In recent years, many companies are working on the development of autonomous cars. Every citizen on the planet is concerned about their safety. In the framework of Advanced Driver Assistance Systems, one of the main goals is to improve safety and reduce road accidents, ultimately saving lives. One of the most difficult jobs in an autonomous driving system is detecting road lanes or road boundaries. Lane and object detection may be a crucial component of collision prevention in driving assistance systems. With the growth in traffic, there is a demand for more security and comfort when driving, it impose the development of new technology. Computer vision is one of the ways that may be utilized to assist the driver in difficult scenarios in order to improve his safety and comfort. The initial layer of autonomous vehicles' capabilities is lane tracking. Many sensors, including as lasers, radar, and vision sensors, are commonly employed for obstacle and lane detection. Computer vision is one of the primary method for detecting road limits and lanes using a vehicle's vision system. The technology uses a camera installed on the vehicle to capture the front view, then uses a few algorithms to detect lanes and objects. The lanes and objects are detected using a flexible algorithm. This paper focuses on a computer vision-based object detection technique by using CNN algorithm.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Nithyakalyani, S. Ramkumar, S. Rajalakshmi, K. Saravanan
{"title":"Diagnosis of cardiovascular disorder by CT images using Machine learning technique","authors":"K. Nithyakalyani, S. Ramkumar, S. Rajalakshmi, K. Saravanan","doi":"10.1109/IC3IOT53935.2022.9768020","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9768020","url":null,"abstract":"Cardiac imaging plays a predominant role in the diagnosis of cardio vascular disorders. The main aim of this project is to diagnosis the cardiac disorders using CT imaging along with a machine learning technique (Artificial neural network). Image processing techniques such as pre-processing, segmentation and classification are using for processing the image. Here segmentation and classification of the CT image plays an important role to diagnose the disorder, for segmentation ANN is being used and for classification SVM is employed both comes under the machine learning techniques. The implementation of machine learning techniques emerges as the artificial intelligence tool that will be of service to diagnosis of cardiovascular diseases. By constructing different algorithms for each process we can obtain précised and automated output. So that, the output of the experiment helps the clinician to diagnose the cardiac disorders more clearly and can be moved to further treatment","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient and Robust Random Forest Algorithm for Crop Disease Detection","authors":"V. Devi, R. Prabavathi, P. Subha, M. Meenaloshini","doi":"10.1109/IC3IOT53935.2022.9767937","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767937","url":null,"abstract":"Nourishment security is a notable risk to crop diseases, however the testimonial stays unmanageable in various countries of the world due to the lack of proper foundation. This study is for productive crop organization in large areas using the key variables namely, texture, phenology, soil moisture, topographic vegetation, different satellite, and climatic data (precipitation and temperature). Since machine learning methodology in the sector of leaf-based image organization has displayed magnificent outcomes, an efficient Learning algorithm to find the impending disorder existing in plants on a massive scale, is used. In this system topographic and climate variables associated with spectral responses are compared and the near-infrared band is used with high spectral range (0.85 to 0.88m). The characteristic feature in image is obtained using Histogram of an Oriented Gradient (HOG). To evaluate RF models, a 20% independent dataset of training samples is used in addition to OOB data. The mean drop in accuracy and mean drop in Gini score are calculated. A comparative analysis is done on different Machine learning algorithms. The proposed RF model is efficient and robust algorithm obtaining an accuracy of 97.2% in detecting the disease to provide nourishment security.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114191310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Break-in-Prevention System With Face Recognition","authors":"Humrutha B, L. K, V. R, U. R","doi":"10.1109/IC3IOT53935.2022.9767864","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767864","url":null,"abstract":"When it comes to real-world problems, machine learning is always a helping hand. By using a machine that has less probability of making errors, in the places where we need maximum accuracy, we can avoid tragic events to the maximum. One of such tragic events is losing our assets. We humans cannot keep monitoring our assets all day. So in this situation, we seek the help of technology. Developing a smart security camera with an inbuilt face facility and an alarming system can reduce the risk of burglary at shops and households. Most shops and houses are under lock during the night time and in this scenario, the shop or the household is prone to theft. Finding and punishing the thieves with the help of recorded CCTV footage after the theft has occurred is a less efficient way of dealing with this crime. The system that we have developed can detect and recognise human faces and can give an alert to the user when an unrecognized face enters the premises of the house/shop when it is under lock. In addition to this, the system also performs the task of a normal CCTV camera, i.e., it records everything it sees. Hence from now, a CCTV camera is not just evidence against a burglary but a powerful tool to prevent it.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122040251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}