J. Shanmugapriyan, R. Parthasarathy, S. Sathish, S. Prasanth
{"title":"Secure Electronic Transaction Using AADHAAR Based QR Code and Biometric Authentication","authors":"J. Shanmugapriyan, R. Parthasarathy, S. Sathish, S. Prasanth","doi":"10.1109/IC3IOT53935.2022.9767978","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767978","url":null,"abstract":"Bank services have become more convenient in recent years thanks to electronic banking, but their security is also improving. Hence security in banking services is enhanced using QR code embedded in the aadhaar card and biometric authentication. Using aadhaar number enables the users to access their accounts in multiple banks. Of all the biometrics, fingerprint trait is chosen because of its characteristics like availability, reliability and high accuracy. Finger print recognition system is used for both verification and identification to make the system more secure. In this system, ATM machine can be operated using the aadhaar card instead of ATM card. The in-built camera in the ATM machine will scan the QR code embedded in the aadhaar card and then match it with fingerprint of the user obtained using the biometric sensor. Only after successful authentication, the user will be allowed to perform cash transactions. Hence the need of ATM card for each bank account is completely eliminated by this system. The work of the people as well as the banking sector is simplified. Not only cash withdrawal but also an android application is developed which uses aadhaar number to perform online cash transactions. Hence the system is designed with large number of security features so that a costumer can perform financial transactions without any security issues.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116286884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mob Analyzer","authors":"A. K, P. G, B. Priya","doi":"10.1109/IC3IOT53935.2022.9767913","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767913","url":null,"abstract":"Crowd detection and analysis have been widely used from urban design and traffic management to disaster and pandemic evacuation and mobility prediction. Currently, several technologies have been incorporated to manage the crowd but it is not efficient due to the wide range of the population. Crowd observation in public places is an incredibly exigent endeavor to accomplish. The immense population and assortment of human actions enforce the crowded scenes to be additional continual. Monumental challenges occur in crowd management together with correct crowd analysis, identification, observation, and anomalous activity in crowd observation. because of severe litter and occlusions, typical methods for managing the crowd don't seem to be effective. This proposed system highlights the various problems concerned in analyzing crowd behavior and its dynamics together with the classification of crowd analysis techniques people counting/density estimation, folks trailing, and behavior understanding or anomaly detection. We need to find the position of a private in sequent frames. The issues of individuals investigation and trailing area unit correlative, as each has the target of characteristic folks in the thronged scene. However, the matter of counting usually has to approximate the number of participants in-crowd, rather than their position. Thus, the alert system focuses on scrutinizing the status of individuals to inform the authorities in case of risky behavior and mob commotion.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117172476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Prathibha, K.R. Saradha, M. R. Kumar, J. Jaiswal
{"title":"Attentive Amigo - Student's alertness Indicator app","authors":"S. Prathibha, K.R. Saradha, M. R. Kumar, J. Jaiswal","doi":"10.1109/IC3IOT53935.2022.9767926","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767926","url":null,"abstract":"In recent situations, the majority of the learning has been moved to e-learning modes which are internet-based classes. But in a live class, an educator can continually screen the understudies by visual examination and dynamic learning. Because of virtual learning, this ability of the educators becomes less efficient. The students are not able to gain enough knowledge as usually they should. The proposed work points towards giving the educator an itemized examination forevery one of the understudies dependent on a physical and passionate investigation of their state during the study hours. Our model analyses live recordings of students and uses factors such as the student's posture, the enthusiastic look on the face, the location of the eyelids, and the student's stance to provide the educator with a certainty score that he or she can use to determine the students' mentality during the class. By knowing which students were attentive and inattentive, the teacher may need to keep a high focus on the inattentive ones. With the effective tecution of our proposed work, it will aid to build up a relationship among the attributes that have been picked and foster this model that will help the instructors to perceive the result of the students, so they can bring better learning techniques nearer to the understudies, while in the security of their own houses, with the help of deep learning and pre-trained data sets to know the behaviour of the students. The utilization of these techniques of mechanically progressed educational strategies and upgraded individual learning examinations will take into consideration the setting up of the labourforce of tomorrow to be exceptionally prepared and able.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126789062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reconfigurable Band switching Antenna for millimeter wave Applications","authors":"Bhuvaneswari Chenikala, Lakshmi Parvathi Devara, B. Alekhya, Zeenath Md, Sirisha Daravathu, Swathi Dasi","doi":"10.1109/IC3IOT53935.2022.9767951","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767951","url":null,"abstract":"This work gives, a latest frequency reconfigurable antenna that is proposed for Bluetooth, WiMAX, and higher WLAN applications with acceptable reconfigurable radiations. The performance of this structure was examined experimentally using a nonflexible FR4 structure which is simulated using HFSS simulator. The proposed antenna uses a T-shaped strip with ON or OFF states at desired frequency operations and has dimensions of an E-shaped slot that are optimal that vary with the ground layer. The prototype is small and light, with switchable millimeter wave applications and frequencies that cover 5G cellular telephony in 24- to 30-GHz bands, as well as UWB operations.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122778795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative Dynamic Watchdog Mechanism for Detection and Isolation of Malicious Nodes through Clustering in Wireless Sensor Networks","authors":"Sindhuja M","doi":"10.1109/IC3IOT53935.2022.9767932","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767932","url":null,"abstract":"One of the most important characteristics of Wireless sensor networks (WSN) is the cooperation among the nodes that are present over the network. Since WSN consists of both static and dynamic nodes, the cooperation has to be managed in an effective manner. But this cooperation activity consumes more cost in terms of resources. The cooperation among nodes is a cost consuming activity as some of the nodes in the working environment can be malicious and selfish which will affect network's overall performance. The malicious nodes are nodes which affect the other nodes in the network whereas selfish nodes are nodes that will not work in a cooperative manner in the network. There is a well-known mechanism called watchdog which is used for identifying these malicious and selfish nodes. In the existing system, the watchdogs have been implemented in a local manner. The local watchdog will take charge of its own node. Implementation of local watchdogs leads to lack of precision when detecting selfish nodes. To overcome this, a Collaborative watchdog mechanism through Clustering (CCOCOWOA) has been proposed for identifying selfish nodes and for recovering the network. This mechanism will work based on the information that will be gathered when a contact occurs with selfish nodes and it will be quickly propagated. It is also efficient by energy and communication cost compared to COCOWA based approach for detecting selfish nodes.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130867348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. S, Bhuvana Roshini. G, Mirunalini. A, Lavanya Sevi. B
{"title":"Eye Blink Controlled Smart Wheelchair Aiding Disabled People","authors":"G. S, Bhuvana Roshini. G, Mirunalini. A, Lavanya Sevi. B","doi":"10.1109/IC3IOT53935.2022.9767936","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767936","url":null,"abstract":"According to a new estimate from the organisation of world health more than 15 percent people in the world are disabled in some ways. The use of motorised wheelchairs with high navigational intelligence is one of the most significant advancements toward the integration of severely physically challenged and mentally disabled people. For seriously disabled person, accessing a wheelchair is found to be tough process unless they use their tongue to manipulate the joystick. Different technologies address many issues that disabled people come across, making people to move safely to complete some key everyday chores. In this paper, it shows a unique system that uses eye-blink sensors to allow a person with a motor handicap to drive a wheelchair. Signal transfer process is accomplished by the radio frequency transmission and reception. They can turn wheelchair left or right by simply staring in the desired direction, as well as start and stop it.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131203370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Detection of Diabetic Retinopathy Lesions Using Deep Learning","authors":"K. Srividya, K. Joshitha","doi":"10.1109/IC3IOT53935.2022.9767907","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767907","url":null,"abstract":"Diabetic Retinopathy is a increasing reason for blindness among working-aged adults in the world. DR is a progressive disease and early detection is very much needed for saving diabetic patients. The blood supply to retina is through tiny vessels which is uncontrolled sugar levels in the blood. When there is a large glucose level in the blood, large lag of oxygen occurs in the cells, as a result blockage occurs in the blood vessels. Any blockage in vessels lead to eye injury and leads to thickening or any abnormal blood vessel which causes DR. DR has many indications like presence of Microaneurysms (MAs), Exudates (EXs), Haemorrhages (HMs), Vascular abnormalities and abnormal growth of retinal blood vessels. This survey paper analyses various reasons for DR, starting from the view of DR, its data sets, Pre-processing techniques followed, extraction of features and detailed analysis of efforts to develop Deep learning models for DR detection.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129594797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Mahesha, R. Suprabha, G. Puthilibai, V. Devatarika, J. R, D. R
{"title":"Investigation of Surface Roughness in Machine using Artificial Intelligence Techniques","authors":"C. Mahesha, R. Suprabha, G. Puthilibai, V. Devatarika, J. R, D. R","doi":"10.1109/IC3IOT53935.2022.9767952","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767952","url":null,"abstract":"Carbon fiber and carbon fiber composites have become more widely used in a multitude of sectors, including defensive line, military, as well as industries. Surface quality is also given careful consideration, as machineries rely on matching parts to work. The Carbon Fiber Reinforced Polymer (CFRP) turning process composites is explored in this research by adjusting three critical cutting variables: cutting speed, depth of cut and feed. Artificial Neural Networks (ANN) and Response Surface Methodology (RSM) have been used to develop an experimental model for assessing surface roughness. The three cutting variables were assessed as experimental design input criteria for these models. In the context of ANN methodology, the traditional backpropagation technique was found as the best option for training the model. Analysis of variance which is referred as ANOVA was used to determine the consequence of cutting parameters on roughness of respective surface. $R^{2}$, RMSE and MEP were computed as 99.9%, 0.016 and 2.17 respectively based on RSM modelling results","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Eldo P. Elias, A. Santhanavijayan, B. Janet, Kumar R Joshua Arul
{"title":"OTP System Based on ECC Key Exchange","authors":"Eldo P. Elias, A. Santhanavijayan, B. Janet, Kumar R Joshua Arul","doi":"10.1109/IC3IOT53935.2022.9768019","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9768019","url":null,"abstract":"The user id and corresponding passwords are generally used for identifying a user in cyberspace. However, this information is not enough to prove that the right person has provided these details. This is where authentication has a role to play. Authentication is the process of proving the identity of a user on a computer system. Identification is used to recognize a person or thing's identity, while authentication is the procedure for verifying that identity. The system can ensure that the right person accesses its resources through authentication. The user has to give some credentials that no one else possesses. It is sometimes called multifactor authentication. One form of multifactor authentication is the one time password (OTP). While using critical services like e-commerce, the user is authenticated using OTP before making the actual payment. Upon receiving the OTP, the user enters it on the client site, which is sent to the server for validation. Submitting OTP to the server through the open network makes it prone to all sorts of attacks that can happen on the open network. An OTP system based on Elliptic Curve Cryptography (ECC) is proposed to avoid sending OTP through an open network. Through the ECC key exchange mechanism, OTP can be generated simultaneously at the server-side and client-side. Hence it is not required to send OTP back to the server for verification. The client itself can verify the OTP without sending it to the server. Not only that, OTP can be used as a session key for all the transactions in the session.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116170842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. K. Jakir Hussain, K. C. Rithic, S. Shyam, M. Prithiviraj, Revathy Rajendran
{"title":"Deep Learning Based Intelligent Screening Mechanism","authors":"G. K. Jakir Hussain, K. C. Rithic, S. Shyam, M. Prithiviraj, Revathy Rajendran","doi":"10.1109/IC3IOT53935.2022.9767865","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767865","url":null,"abstract":"Facial recognition is widely used for identification of people as one of the biometric authentications. Biometric authentication consists of two types physiological and behavioral features. In physiological biometrics, faces, iris, and fingerprints are used for identifying the person. In behavioral biometrics, their characteristic features namely voice, DNA and hand writing is used. While using facial recognition, an individual can be identified using the previously trained model using deep learning based on the Haar cascade algorithm. Biometric authentication has been generally used for surveillance purposes. However, due to the COVID 19 pandemic, people of each nation are in need to wear face masks for their safety. Our project uses deep learning and open cv to recognize the person and to identify whether he wears a face mask or not by using transfer learning techniques and convolution neural network. One large dataset of people with mask and people without a mask was used as a training model. Our project was able to achieve an accuracy of 96.8% during the training and testing phase.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114770124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}