{"title":"Novel Improved Communication Steadiness Routing for Wireless Sensor Network's Performance Analysis compared with Network Boundary Maintenance Routing","authors":"T. Anitha, S. Sridhar","doi":"10.1109/ICECONF57129.2023.10083655","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083655","url":null,"abstract":"The main intention of the work is to achieve packet transmission steadiness for any abnormal condition and to detect the invalid path in Wireless Sensor Networks (WSN), using a novel improved communication steadiness routing (ICSR) over Cluster-Chain Mobile Agent Routing (CCM) is implemented. Materials and Methods: ICSR and CCM are implemented in this research work to increase path stability and minimize energy consumption in order to improve communication. Sample size is considered using $mathbf{G}$ power software and determined as 10 per group with pretest power 80%, threshold 0.05% and CI 95%. Results: To discover the incorrect path, a void path identification technique is used if a path is not kept active for an extended period of time, nodes in the route may miss data packets while communicating to each other. As a result, an energy-efficient stable way for routing is required to minimize energy consumption and increase path stability. Path stability, network lifetime, end to end delay packet delivery ratio, and energy consumption, network overhead are the metrics used to measure the performance of ICSR and CCM models at different study groups with $boldsymbol{mathrm{p} < 0.05}$. ICSR provides a higher of 94.05% compared to CCM with 79.56% in minimizing energy consumption and to increase path stability. The significant charge was 0.000 $boldsymbol{(mathrm{P} < 0.05)}$ showing that two groups were statistically noteworthy. Conclusion: The Novel Improved Communication Steadiness Routing model's performance is compared with Cluster-Chain Mobile agent routing (CCM) model, from the results it is clear that ICSR outperforms CCM model in all the parameters.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122759848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Innovation Success Prediction Model of Android Application Using Logistic Regression Over MLC in Combination with PCA","authors":"A. Ranadheer, L. Parvathy","doi":"10.1109/ICECONF57129.2023.10084279","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10084279","url":null,"abstract":"The goal of this work is to assess the correctness and exactness of LR and Maximum Likelihood Classification (MLC) Classification algorithms in predicting the success of Android applications. A framework for predicting the success rate of Android applications that compares Logistic Regression and Maximum Likelihood classifiers has been proposed and developed. The sample size was determined using G powers to be 10 in each category. Sample size was calculated using clinical analysis, with alpha and beta numbers of 0.05 and 0.5, 95% assurance, and 80% well before power. The following results are obtained by running algorithms for various iterations. The Logistic Regression classifier predicts the success rate of an Android application with an accuracy of 80.3%, while the Maximum Likelihood classifier predicts it with 95.1%. The significance level is 0.001 $(mathbf{p}mathbf{0.005})$. As a result, Maximum Likelihood Classification outperforms LR classifiers. In terms of precision and accuracy, the results show that the Maximum Likelihood classification (MLC) outperforms the Logistic Regression.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123325298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel and Robust Gait Recognition method based on Hybrid Learning Methodology","authors":"Yesodha. P, J. Mohana","doi":"10.1109/ICECONF57129.2023.10083824","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083824","url":null,"abstract":"Model-free methods for recognizing human gait rely on tracking the form and velocity of the person in motion. Recognizability at far distances with suitably low-resolution photos is a strength of this method. Extracting gait characteristics from gait frames using this method is a breeze. This model-free method can be approached from several angles. This paper's goal is to develop a novel approach to gait identification, dubbed a “Hybrid Learning Classifier,” that combines an AI technique with learning principles (HLC). First, a binary outline picture of a walking human is recognized from each frame using this approach. Second, an image processing technique is used to extract features from each individual frame. Important characteristics discussed here are stature, hand and leg length, and left-right and right-left distances. Finally, HLC is put to use in the form of evaluation and practice. We've done away with the need to use a reductant training vector when choosing a model to train on or adjusting any of the many parameters associated with doing so. All of our research here utilizes our gait database. Depending on which datasets are used for training and which for testing, different conclusions might be drawn. This paper's concluding portion offers appropriate verification of everything said, presented graphically and with precise description.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115971789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kunal Shetye, Shruti Gupta, K. Naidu, Siddhant Keskar, Priti Shahane, H. R.
{"title":"IoT Based Stormwater Quality Management System","authors":"Kunal Shetye, Shruti Gupta, K. Naidu, Siddhant Keskar, Priti Shahane, H. R.","doi":"10.1109/ICECONF57129.2023.10084104","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10084104","url":null,"abstract":"Many elements of the world and their climate area unit susceptible to continuous degrading the quality of stormwater and rainwater that can be of daily use instead of it being wasted, now many authorities and smart city developers are planning to set up a continuous water quality management system on the water collected from rains and storms, to have a continuous monitor over the quality and useability of the water caught in the tanks overhead of all buildings. Other than one facet of stormwater runoff, that might contain other level of pollutants likes oils, petrochemicals, lead, mercury, phosphates and nitrates. Other level of pollutants are also present which widely determine the drinkability and useability of the water, which are total dissolved solids, total suspended solids, conductivity, dissolved oxygen, turbidity, pH, BOD, COD, etc. For which the use of sensors with Internet of Things (IoT) devices are most efficient, accurate, feasible when building a monitoring system. Continuous monitoring and displaying the calculated data on an LCD screen and on a cloud server of Think speak that allows authorization to multiple users to access the data remotely and at any desired time. Using analog sensors and cumulative formulas from some parameters we calculate and get calibrated and accurate values from all sensors IoT here plays a very essential role and gives an upper edge than other traditional or chemical methods, as it provides much better response time and flexibility than any of the other methods. Using IoT devices also gives a huge scope in upgrading the system for further complex situation and demands with fast changing scenarios","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"37 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131471013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sk. Shamreen, M. Madhavi, L. Priyanka, B. Saravani
{"title":"Privacy Preservation of Business Forecasting Using Homomorphic Encryption","authors":"Sk. Shamreen, M. Madhavi, L. Priyanka, B. Saravani","doi":"10.1109/ICECONF57129.2023.10083676","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083676","url":null,"abstract":"Data privacy is very much essential in this digital world. Data privacy prevents the information of an organization from fraudulent activities such as hacking, phishing, and identity theft. Machine learning is an emerging technology. But a huge amount of data is required for training the Machine learning model. When an organization wants to analyze their profit rate it has to send its data to third party which may reveal organization's business tactics or sensitive data. Hence, there is always a risk of data privacy. So, privacy preserving is used. Privacy preserving prevents data leakage from machine learning algorithms. There are many privacy preserving machine learning strategies which are used for data privacy. Homomorphic Encryption is one such technique. In homomorphic encryption, the data to be fed to train the machine learning model is encrypted. The encrypted data is then fed to the machine learning model. The machine learning model performs the required computation and returns the result in encrypted form, which on decryption returns the required output","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132207536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Vignesh, A. kumar S, T. M. Amirthalakshmi, P. Delphy, J. Arunkumar, S. Kamatchi
{"title":"An Efficient and Intelligent Systems for Internet of Things Based Health Observance System for Covid 19 Patients","authors":"R. Vignesh, A. kumar S, T. M. Amirthalakshmi, P. Delphy, J. Arunkumar, S. Kamatchi","doi":"10.1109/ICECONF57129.2023.10084066","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10084066","url":null,"abstract":"This paper describes how an IoT -based health monitoring system was conceived and built (IoT). With the proliferation of new technologies, doctors nowadays are constantly on the lookout for cutting-edge electronic tools that will make it simpler to detect abnormalities in the human body. The Internet of Things makes it possible to create cutting-edge, non-intrusive healthcare assistance systems. In this article, we introduce the Comprehensive Health Monitoring System, or CHMS. Normal people can't afford to buy separate devices or make frequent trips to hospitals. Our CHMS will monitor a patient's vitals, including temperature, heart rate, and oxygen saturation (OS), and relay that information to a portable device. To make sense of the information gathered by the physical layer's sensors, the logical layer must analyses it. The application layer then makes judgments based on the processed data from the logical layer. The primary goal is to reduce costs for average consumers. Patients will have simple access to individual healthcare, in addition to financial sustainability. This study introduces an IoT -based system that would streamline the operation of a complex medical gadget while reducing its associated cost, allowing its users to do so from the comfort of home. The public's adoption of these gadgets as aids in a given setting might have significant effects on their own lives.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Water Quality Prediction using Neural Networks","authors":"S. Babu, Banavath Baby Nagaleela, Cheekurimelli Ganesh Karthik, Lakshmi Narayana Yepuri","doi":"10.1109/ICECONF57129.2023.10084120","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10084120","url":null,"abstract":"Water is necessary for all forms of life. The characteristics of water aid in regulating biotic diversity, vigor, and rate of succession. The deterioration of shared water resources, including lakes, streams, and estuaries, is one of the most serious and alarming problems currently confronting mankind. Each aspect of life is affected by the wide-ranging effects of dirty water. As a result, forecasting water quality has become essential in reducing water pollution. In this project, we have used the Long Short Term Memory(LSTM) algorithm in Neural Network andthe Decision tree and Naive Bayes classifiers will be used for classification for Water Quality Index (WQI). Here we will use Chemical Oxygen Demand (COD), Dissolved oxygen (DO), pH, temp parameters to determine the quality of water. This approach can be useful to accurately simulate the water quality. In order to achieve sustainable development, it is crucial to evaluate the fundamental aspects of the water environment. As a result, this model may potentially give simulated values for desirable places when measured data is unavailable but required for water quality models. Parameters with an impact on or an effect on water quality were estimated for this data.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128106865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain Open Source Tools: Ethereum and Hyperledger Fabric","authors":"Sri Santhoshi Devi Arigela, Persis Voola","doi":"10.1109/ICECONF57129.2023.10084256","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10084256","url":null,"abstract":"In recent times, blockchain has received a lot of exposure due to its increased usage in many fields. Blockchain is a decentralized and open ledger that contains information on transactions. It works as an underlying technology for cryptocurrencies like bitcoin and others. It eliminates the double-spending problem by implementing the digital signature mechanism. Blockchain technology has evolved to address the confidentiality and other technical issues that come with using distributed databases. It offers a decentralized environment for processing the transactions, establishes trust among the nodes participating in the network, and also removes the use of central third-party authority. The blockchain contains information on every transaction and is completely change-resistant. It offers peer-to-peer networks in which all nodes are able to validate the transactions happening in the network using a consensus mechanism. This is a very revolutionary technology that has been developed and widely used in a variety of fields. But still having some challenges like security, privacy, storage, scalability, latency, higher consumption of energy, and others. In this paper, the two popular open-source tools for blockchain technology are presented: Ethereum and Hyperledger Fabric. Ethereum is public and permissionless platform whereas Hyperledger Fabric is private and permissioned. The Transaction life cycle of Ethereum and the architecture of Hyperledger Fabric are discussed.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116866367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis on Keylogger Attack and Detection based on Machine Learning","authors":"Yeshaswini Balakrishnan, R. P N","doi":"10.1109/ICECONF57129.2023.10083937","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083937","url":null,"abstract":"A keylogger attack is a type of cyberattack that involves the use of a software program to record keystrokes on a target device. Attacks of this kind can be used to steal sensitive data, including credit card numbers and login credentials. Keylogger attacks are often targeted at specific individuals or organizations, and the attackers may have prior knowledge of the target's systems and configuration. There are a variety of ways to carry out a keylogger attack, and the attacker's choice of method will depend on the type of information they are trying to steal. For example, an attacker may install a hardware keylogger on the target's computer in order to record every keystroke made. As an alternative, the attacker might develop malicious software that captures keystrokes and transmits them to a distant server. Keylogger attacks are difficult to detect, as the keylogger software can be disguised as a legitimate program or run in the background without the user's knowledge. However, there are some signs that a keylogger attack may be taking place, such as unexpected activity on the computer or unusual network traffic. The best way to protect against keylogger attacks is to use a reputable antivirus program and to keep all software up to date. Furthermore, users need to be cautious while opening attachments or clicking on hyperlinks that come from unknown sources. This paper focuses on the evolution of technology over time, as well as the implementation and observation of keylogger attacks.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. M. D. Charaan, P. Therasa, M. Vasudevan, S. Karthi
{"title":"Awake/Sleep Mechanism Using LEACH Protocol in WSN - An Energy Efficient Approach","authors":"R. M. D. Charaan, P. Therasa, M. Vasudevan, S. Karthi","doi":"10.1109/ICECONF57129.2023.10083738","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083738","url":null,"abstract":"The hierarchical clustering, like the LEACH protocol, utilizes the Cluster Head system for collecting and aggregating and transmitting data. The Cluster Heads are chosen in arbitrary after each round based on the information transmitted by the sensor node. Cluster Heads or the non-Cluster Head nodes which are at a greater distance from the Base Station will consume extra energy in sending information from a similar distance. The ASLEEP mechanism is induced in the traditional LEACH protocol. Accordingly, the new methodology expands the lifetime of the network to a greater extent. The time of talk interval should be set with the base time expected to effectively get the whole message from all the sensor nodes. The sleep mechanism in LEACH consequently changes the sensor nodes exercises, in this way accomplishing low power utilization and low message inactivity. This drags out the network's lifetime by a component that directly relies upon the level of redundancy. In any event, during the low duty cycle, the sleep time of adjoining nodes times are coordinated.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124024493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}