{"title":"A DNN is Programmed Prediction Scholarly Accomplishment","authors":"Mizan Ali Khan, H. Kaur","doi":"10.1109/SMART55829.2022.10047123","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047123","url":null,"abstract":"Predicting student behavior and achievement in the present educational system is becoming more challenging. If we are able to forecast student performance in the past, it will be easier for both students and their teachers to monitor their progress and activities. Nowadays, the continuous assessment approach has been implemented by several colleges all around the world. Such technologies are helpful to students in raising their grades and performance, as well as to instructors in assessing the pupils and concentrating on those who exhibit poor performance. This assessment system's primary purpose is to assist all normal students and teachers. Artificial Neural Networks (ANN) have recently seen widespread and successful implementations in a wide range of data mining methods and applications, and are frequently far superior to other classifiers, whether they be machine learning representations and others like training algorithm, stochastic gradient descent, or minibatch. In light of educational data mining, the purpose of this article is to determine if artificial neural networks (ANN) are an effective predictive classifier to forecast students' performance using a dataset from a learning system. On this dataset of LMS, we will evaluate the performance of neural networks to that of several other classifiers in order to assess their applicability. Support Vector Machine (SVM) is one of these classifiers.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133234637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Graph Database-Based Method for Network Log File Analysis","authors":"K. Sharma, Arvind Kumar","doi":"10.1109/SMART55829.2022.10047250","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047250","url":null,"abstract":"It is frequently required to evaluate data acquired from numerous network logs in order to offer a more accurate judgement of the severity of a cyber threat. This may be accomplished by reviewing the data. One example would be the examination of log records produced by command line tools in solitary confinement. In spite of the fact that employing a log management system makes it simpler to identify certain log documents, it might be time-consuming to examine all of them in order to determine the connection(s) between the different types of network activity. To construct these bridges, we may make use of relational databases by, for example, linking the tables by using complicated database queries that make use of a large number of join processes. Recent years have seen a rise in interest in the use of graph databases as a method for the storage and organization of data in preparation for semantic searches.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124341523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"“Secure Architecture for Providing Data Authenticity in IoT Enabled Devices”","authors":"Shivangi, Gulishta Khan, S. Ninoria","doi":"10.1109/SMART55829.2022.10047067","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047067","url":null,"abstract":"The Internet of Things (IoT) is a young technology that is rapidly evolving. because of importance of IoT within the destiny, it will be extremely important to create adequate security for IoT infrastructure. Via this existing article, the architecture of IoT and their security dimensions are addressed after presenting and exploring the securities and demanding scenarios of various IoT layers. The use of sensitive information that needs to be kept secret from third parties will increase as a result of the development of modern private technologies. In order to assess and mitigate many IoT privacy issues and support the design and deployment of cosy and touchy systems, present methodologies are neither sufficient nor powerful. This study suggests a data authentication architecture in this situation. In particular, there may be a drive toward adopting secure IoT architectures that rely on physically unreproducible capabilities and in-depth research to guarantee the privacy of retrieved IoT data.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130281640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Pant, A. Rajawat, S. B. Goyal, Deepmala Singh, Neagu Bogdan Constantin, M. Răboacă, C. Verma
{"title":"Using Machine Learning for Industry 5.0 Efficiency Prediction Based on Security and Proposing Models to Enhance Efficiency","authors":"P. Pant, A. Rajawat, S. B. Goyal, Deepmala Singh, Neagu Bogdan Constantin, M. Răboacă, C. Verma","doi":"10.1109/SMART55829.2022.10047387","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047387","url":null,"abstract":"Machine learning, with its huge untapped potential, is being researched all over the world to develop truly intelligent systems. Its applications are not enclosed in just one domain but in almost everything, from prediction models, recommender systems, and anomaly detection to automation and teaching a computer how to fly a helicopter. In this research, Multivariate Linear regression of supervised machine learning is studied to predict the efficiency of Industry 5.0, however, the efficiency of the model would be dependent on many factors and components such as security protocols and models, Industrial IoT - performance, connectivity, reachability, availability and many more. These factors and components would be categorized as the features of the algorithm which would be assigned weight ‘w’ and bias ‘b’. To improve the efficiency of the model, these components could be changed and updated in order to enhance the overall model. Previous research papers discussed the integration of “hot” technologies like 5G, Blockchain, AI, and IIoT in the industry 5.0 model, but this research is presented as their future work as it proposes to determine the efficiency of the model based on the features provided so that ultimate and optimal model could be determined. Later it proposes security and IIoT models that could improve the overall Industry 5.0. Quorum blockchain is proposed by the research in order to implement the ultimate security in the Industry 5.0.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131605548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Tyagi, Rajesh Singh, M. Kalyan Chakravarthi, Prabhdeep Singh, A. P., Ch. Raghava Prasad
{"title":"Advanced IoT Home Automation using ThingSpeak and Google Assistant IoT Platform","authors":"P. Tyagi, Rajesh Singh, M. Kalyan Chakravarthi, Prabhdeep Singh, A. P., Ch. Raghava Prasad","doi":"10.1109/SMART55829.2022.10047017","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047017","url":null,"abstract":"The Ict (IoT) is a significant system that connects numerous items to the network and network communications. It enables links between individuals and things in almost any manner from any point at any time. Numerous IoT-based options exist. Home security system are some of the most well-liked applications that have raised the quality of people's lives. In this work, we offer an advanced processing concept that has been intuitive and can be used to buy and run household products from any part of the globe. This gadget is smart and focused in commanding other devices with speech processing and understanding. Therefore, the primary goal of the work is to create a sophisticated control system that is far more stable and intelligent enough to get out gas and human effort. Detector, thermistor, MQ2 gyroscope, or GPS module are the major four devices shown in this system. This female's embedded systems are all affordable, available, and interchangeable.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"786 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113995420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intensive Analysis of Recent Trends of Block Chain Technology in the Role of Development in the Healthcare Sector","authors":"Merin Thomas, V. Karunakaran","doi":"10.1109/SMART55829.2022.10047286","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047286","url":null,"abstract":"The efficacy of the block chain will be examined in this report to provide more context. Here, the synchronisation of records' information depending on several treatment layers will be shown. This study tries to give succinct overview of the block chain and how it influences an extensive literature assessment on the subject. To apply a fundamental concept of block - chain, pros and cons of block chain technology in the healthcare field will be shown. Utilizing block chain technology, many problems in medical groups may be avoided by comprehending incorporated components. We have seen quality standards processes in the healthcare industry as a result of block chain technology. The literature component of it will outline the whole healthcare and its operations. It may be concluded that block chain technology is seen as a realistic objective in the medical field by performing a thorough evaluation of publications and magazines that have undergone evaluation. Some of the biggest goals for blockchain in the health care field are reportedly accountability and accountability. This essay will provide priceless insights on the subject that will alter how people see block chain technology. in general. The apparent originality of this subject will be discussed for further evaluation, which will link readers to helpful sources. This study will demonstrate how health care workers may look at many facets of information infrastructure based on block chains. For the purpose of supporting the methodology selected for this research paper, a survey will be conducted.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomous Military Robot using IoT for Covert Operations and Multiutility Computing","authors":"Anshuman Singh, Jagdeep Kaur Walia","doi":"10.1109/SMART55829.2022.10047025","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047025","url":null,"abstract":"Scientists are now intrigued by top, and the growth in human requirements has inspired both scientists and students to create new automated technologies. This essay may aid in understanding how the field of autonomous car technology is evolving. Their performance and usability have improved as a result of technological advancements and updates. The interaction between the autonomous vehicles or equipment is the most important necessity. Additionally, the Indian government is focusing a significant amount of money on military development. This research focuses on a connection mechanism between a wireless router bot that is perfect to the point that connecting does not provide a challenge. To do this, transceivers for data connection linking the games console to the car would have been set up on the Raspberry Binding protein relays (bot). Wi-fi connectors will serve as transmitting transmitters or extensions in this program to increase the connection and range of a far-off car. With using this connection, the robot could quickly send data to the patient's computer so that biometrics can be used to record a live broadcast. This project makes advantage of cutting-edge studies on types of networks and interconnection methods in IOT devices. The transmission method increases the chatbot's interaction with the user by deploying more relay bots, ensures that data transmission is untraceable, and widens the range of remote connections. Barriers and any suspicious behavior may be quickly recognized and reported to the military facility using the current algorithms.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"1123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122940069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shashidhar Sonnad, M. Awasthy, Kantilal Rane, Moon Banerjee, D. Buddhi, Bhasker Pant
{"title":"Blockchain-Based Secure Mengers Authentication for Industrial IoT","authors":"Shashidhar Sonnad, M. Awasthy, Kantilal Rane, Moon Banerjee, D. Buddhi, Bhasker Pant","doi":"10.1109/SMART55829.2022.10046934","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046934","url":null,"abstract":"The Industrial Internet of Things (I-IoT) is positioned as one of the most evolutionarily potential techniques for enhancing the production environment, logistics, and production in industrial settings. While a production method is more complicated, it is necessary to give a full operational IoT where equipment from various environments, such as mobility, plan to operate on the same job, ensuring more security and confidentiality for equipment when communicating. Some popular something which result in third-party secure and address the main management challenges. As a result, security and confidentiality need more attention since they are still a problem. In this study, Menger's identification with block chain assistance is a brand-new and effective security method that is expected to build trust across diverse domains. Security is implemented here via the authorization process. Gadget privacy is maintained by the mengers verification system, which also achieves unit identification across linked devices. The distribution of keys among the linked parties is still subject to negotiation via the appropriate channels for communication. Here, MATLAB is used for the simulation, and the results demonstrate superior results during the authorization process.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127673111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Kumar, A. Saxena, Gopal Kumar Gupta, Kamesh Kumar
{"title":"Duality of Graph and Its Application in Electric Circuit","authors":"P. Kumar, A. Saxena, Gopal Kumar Gupta, Kamesh Kumar","doi":"10.1109/SMART55829.2022.10047073","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047073","url":null,"abstract":"Graph theory is broadly used to verify many arithmetical theories and models. This assessment introduces the use of numerous graph concept theories to clear up difficulties in numerous sectors of technology and generations similarly to arithmetic. A number of them fields encompass computer technology, chemistry, biology, virtual image processing, webpage design, scientific technology and overall performance studies. In a mathematical idea take a look at of the graph, a double graph of the Gr is a plane with a vertex of one face of Gr. A twin graph has the rims of every pair of facets in Gr splits from the alternative via the edge, and a self-loop where the equal face appears on each facets of the image(2). Here we explain a scholar task in which we build a calculation answer for an electrical circuit primarily based on graph concept theory. This multidisciplinary technique includes abstract mathematics, linear algebra, circuit physics and computer programming, in order to achieve the automated aim-solving intentions(1).","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128924954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Median Filter in Comparison with Gabor Filter for Skin Cancer MRI Images Based on PSNR and MSE","authors":"S. Likhitha, R. Baskar","doi":"10.1109/SMART55829.2022.10047499","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047499","url":null,"abstract":"Themain aim of this research is to filter Skin Cancer MRI images based on the image processing technologies using novel median filter algorithm and is compared with Gabor filter algorithm. This research contains two groups, each with a sample size of 20 with Gpower of 80 percent. The performance of the novel median filter is evaluated and the performance measurements such as PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) are compared with the Gabor filter. According to the data obtained by simulating with matlab, the novel median filter's PSNR is 31.64, and its MSE is 9.094, whereas the Gabor filter's PSNR (Peak Signal to Noise Ratio) is 27.02, and its MSE (Mean Square Error) is 11.52. From the statistical analysis, it is observed that the significant value of PSNR (Peak Signal to Noise Ratio) (0.409) and $mathbf{p} > 0.05$ and value of MSE (0.010) of the algorithm is $mathbf{p} < 0.05$. In this study, it is found that the novel Median filter performs better than the Gabor filter in terms of PSNR and MSE.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129174460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}