{"title":"Evaluation of Biometric Classification and Authentication Using Machine Learning Techniques","authors":"N. Umasankari, B. Muthukumar","doi":"10.1109/ICECONF57129.2023.10083610","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083610","url":null,"abstract":"This research article proposed the performance measurement of biometric image with computational methodology. This research adopts the following procedures: pre-processing, Feature extraction and Classification. Designing and building the algorithm and simulation programs have been done in a MATLAB environment. My SQL has been utilized for the maintenance of overall dataset. By employing the classification technique comparative analysis was carried out by inspecting three data mining techniques which were: Random Tree, The multilayer Perceptron neural network (MPNN), and the C4.5 decision tree (DT) algorithms. As per the final conclusion, the Random Forest Classifier algorithm exhibits greater performance in contrast to the other techniques. It has been found that the 93.5 % accuracy exhibited by Random Forest Classifier is much greater and enhanced.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124161993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-mode Summarization of Surveillance Videos using Supervised Learning techniques","authors":"R. M, Aruna Devi, Divya Mo","doi":"10.1109/ICECONF57129.2023.10083764","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083764","url":null,"abstract":"Video summarization has been a prevailing area due to the wide use of surveillance systems. Extracting the contents from these video frames for domain-specific usage has become a tedious task. There are many approaches for the augmentation and detection of video content. A single platform for generating a summary of the surveillance videos will be revolutionary as security surveillance is becoming challenging day by day. This work is based on the various literature available for managing the video content especially for extracting the face, activity, and detecting the Object of Interest (OoI). The agents are identified based on an extensive literature survey on various approaches for object detection, activity recognition, and identity verification. The survey has helped to find out the best-performing algorithm in each of the above-mentioned domain. The work has proposed a unique architecture, Multi-mode Summarization of Survellance video System(MSSVS) where the observer can select agents, and based on this the metatag of the activity can be generated.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Crow Lookup and Particle Optimization Algorithm-based Cluster Head Selection","authors":"P.Vinoth Kumar, K. Venkatesh","doi":"10.1109/ICECONF57129.2023.10083909","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083909","url":null,"abstract":"A high number of sensor nodes in a wireless sensor network are dispersed randomly throughout some areas. Each node has a finite amount of energy, and when certain events that need communication with a sink node happen, it generates information. It has been demonstrated that the nodes that are physically located closer to the sink node will use up their energy reserves at a faster rate; hence, the lifetime of the network will be shortened, and a number of unfavourable outcomes will occur. As a result, the question of how to best maximise the lifetime of the network has become an important one. We came to the conclusion, based on the research fruit that was contributed by a large number of researchers, that the method for optimising the life of the network included maintaining energy efficiency, enhancing or developing certain optimised methods, and utilising the built-in functionality of nodes, among other things. Numerous other elements may also have an impact on the network's lifespan. It is determined that choosing CH by mixed heuristic algorithms is important for avoiding the decline over the past of energy over the existing system. Through this work, CH Extraction using Integrated Crow Look and Particle Optimization Technique (ICLPOT-CH) such protocol was suggested with advantages of Improved wild crows scan and augmented POT to boost WSNs' resource consistency and system longevity. To accomplish effective CH allocation, our ICLPOT- CH technique calculates important aspects like load, perpetual life, traversed length, latency in gathering data, and loss rate. Our experimental result of a suggested ICLPOT-CH validated a network throughput extension with a largest amount of active nodes and a minimum number of fatalities node, regardless of the number of edge devices, relaying cycles.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114732461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Banupriyal, Suresh G, R. Nandhini, A. M. Mathew, L. Saravanan, A. G
{"title":"A Robust Network Connection Across Internet of Things Devices Inside the Room with Visible Light Communication","authors":"N. Banupriyal, Suresh G, R. Nandhini, A. M. Mathew, L. Saravanan, A. G","doi":"10.1109/ICECONF57129.2023.10084326","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10084326","url":null,"abstract":"In order to better monitor and engage with the communal assets of smart cities, the amount of Internet of Things (IoT) devices that have been installed has been continuously rising. This might result in a reduction in network efficiency as a consequence of the increasing volume of network traffic and connections brought about by different Internet of Things devices. In order to address these challenges, one approach that shows promise is to take advantage of the close physical proximity of communicating devices and to facilitate communication between individual devices in order to achieve low latency, efficient use of bandwidth, and reliable service. Taking use of new technologies like visible light and ultrasound, our study aims to improve the performance of indoor Internet of Things (IoT) connectivity in settings such as smart homes and small office and home offices (SOHO). This method expands the capacity of the network, ensures that network connections among IoT devices are stable, and offers effective ways to allow distance-bounding services. We have constructed communication modules for visible light and ultrasonic using off-the-shelf components, and we are now evaluating their network performance as well as their energy usage.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114803499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Pardeshi, Akash K. Chaudhari, P. Thokal, Ritesh S. Dighe, P. William
{"title":"Framework for Deployment of Smart Motor Starter using Android Automation Tool","authors":"D. Pardeshi, Akash K. Chaudhari, P. Thokal, Ritesh S. Dighe, P. William","doi":"10.1109/ICECONF57129.2023.10083946","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083946","url":null,"abstract":"In today's era of technology a control system without an automation is worthless and not that much efficient. A control system must be integrated with an automation to conduct the day-to-day challenging task in an easy way and can save a time and cost of manual operation. In India some of the farmers are using their own techniques of smart farming. But in some areas smart farming is not yet developed due to less knowledge about the technology. Some farmers are using the technologies that can increase the crop yield directly but in some scenarios crop yield can be increased by using some indirect ways. Some of them are borewell charging, poly house water management automation, submersible motor automation, etc. in our survey we found that if farmers are using a new technology there are some misleading concepts, they have regarding it so to nullify the problem of farmers we are introducing a smart device that can be used to automate the motor starter remotely.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Conceptualization and Implementation of a Patient Monitoring System Based on the Internet of Things for Use in Telemedicine","authors":"M. N, Sindhu E, Mulla Safraz","doi":"10.1109/ICECONF57129.2023.10084203","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10084203","url":null,"abstract":"As a multifaceted approach to delivering healthcare remotely, telemedicine draws on expertise in areas as diverse as physiology, biomedical instruments, and communications. Telemedicine is the use of electronic networks and other forms of electronic communication to provide healthcare services to people who are geographically separated from one another. This is done so that people can receive accurate and up-to-date information about the causes, symptoms, and treatments of illness and injury, as well as receive ongoing training from healthcare professionals. It's an effective answer to problems including a lack of medical professionals, far-flung communities, and an overwhelming patient population. Testing, monitoring, and treating a patient by a doctor who is not present in the same room are all components of telemedicine. Because of this, getting from one place to another takes less time. Collecting data, putting it in a repository where it can be processed, and then sending it to another location are the pillars upon which telemedicine services are built. Despite its many benefits, telemedicine has yet to reach its full potential in practise. This is largely owing to the prohibitive cost of the specialised equipment required by telemedicine systems. Due to the inability of the doctor to assess the patient's vitals through video chat alone, this method of telemedicine falls short. To counter this, we need a system with precise sensors for monitoring vital signs and other health indicators.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sivakumar, R. Raffik, K. Kiran Kumar, Bramah Hazela
{"title":"Scada energy management system under the distributed decimal of service attack using verification techniques by IIoT","authors":"S. Sivakumar, R. Raffik, K. Kiran Kumar, Bramah Hazela","doi":"10.1109/ICECONF57129.2023.10083924","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083924","url":null,"abstract":"Automation and control systems are becoming more networked thanks to the Industrial Internet of Things (IIoT). The SCADA network has also developed into a more open and interconnected system. In addition, by connecting industrial electronic devices to the SCADA network, the interconnectivity and efficiency of methods have been significantly increased owing to the control and monitoring benefits of SCADA. The SCADA system is inextricably linked to the public network, and security breaches and cyber-attacks are a legitimate worry for the SCADA network system. We propose to deter attackers from launching distributed denial-of-service attacks in this work with a token authentication module. According to the experimental findings, the security defence architecture provided by this study may successfully increase security while being compatible with realworld energy management systems in the field.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121758010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Pushpavalli, P. Abirami, P. Sivagami, M. Kavitha, C. Bhuvaneswari, W. Memala
{"title":"Creation of a Drowning Prevention System for Kids Learning in Pool using Computational Technology","authors":"M. Pushpavalli, P. Abirami, P. Sivagami, M. Kavitha, C. Bhuvaneswari, W. Memala","doi":"10.1109/ICECONF57129.2023.10083598","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083598","url":null,"abstract":"Every year, several people drown at the deep end of swimming pools, including young kids, and the lifeguards are ill-prepared to handle these accidents. As a result, it becomes necessary to have a system that will recognize drowning victims and inform lifeguards through voice when such a risk exists. A surveillance system for the swimming pool has a specific function in keeping the area safe. The need for a method to stop newborn drowning is critical. The newborn drowning prevention system prototype was displayed. The project was created using the hardware and software of Android. Differential conductivity sensors are employed in this project to identify drowning incidents. At the earliest possible stage, in swimming pools. When youngsters drown in the swimming pool, their lives are saved. Convenience, cost savings, and a straightforward algorithm are advantages of the conductivity sensor-based demo system. This technology keeps an eye on crucial factors like an infant's movement and drowning state. This information is given to their parents via the GCM network. These important metrics can be measured, and a risky scenario can be communicated to the caregiver through an alarm triggering system to start the appropriate control measures.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130239074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Chandra, G. Sowmiya, G. Charulatha, S. D, S. Gomathi, R. Anusuya
{"title":"An efficient Intelligent Systems for Low-Power Consumption Zigbee-Based Wearable Device for Voice Data Transmission","authors":"I. Chandra, G. Sowmiya, G. Charulatha, S. D, S. Gomathi, R. Anusuya","doi":"10.1109/ICECONF57129.2023.10083856","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083856","url":null,"abstract":"Instantaneous speech, audio, image, and video transmissions are all possible with short-range wireless technology. With the rise of portable and power-independent devices, the efficiency and range of such networks have become increasingly important in order to solve the challenges of reducing prices and energy use to make this model more useful to the common people. Information on the functioning of the network, such as wireless voice communication, is presented here. As a result, this action was taken to reduce the total manufacturing cost of such devices that are used in home automation systems and similar endeavors. The study's major focus was on developing a method of Zigbee-based voice communication. To reduce the high cost of equipment and communication by 25%without sacrificing security, we designed a Zigbee-based wireless sensor network (WSN) communication system for the safe transfer of voice data over a medium-range distance. To ensure the suggested ZigBee-based home network system works as intended, a testbed has been set up. Long-term wireless network monitoring energy savings, packet loss, and the efficiency of the proposed system were all analyzed.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134234778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive Deep Neural Network for Aspect-Level Sentiment Analysis","authors":"R. Nareshkumar, K. Nimala","doi":"10.1109/ICECONF57129.2023.10083812","DOIUrl":"https://doi.org/10.1109/ICECONF57129.2023.10083812","url":null,"abstract":"Opinion mining, also known as sentiment analysis, is the act of analysing text written in natural language on a topic and categorizing it as positive, negative, or neutral based on the sentiments, emotions, and views stated in it. On the internet nowadays, the number of people who express their ideas through reviews is growing day by day. Manually analysing and extracting thoughts from such a large number of evaluations are nearly very complex and much tough to handle. The work analyses the deep learning techniques for extracting aspects in opinion mining in this research. Aspect extraction is a subtask of emotion investigation that needs discovering opinion targets in opinionated text, and identifying the precise characteristics of a product or service. A model for fine-grained aspect-based opinion mining is proposed that addresses important aspects of effective aspect-based opinion mining. Therefore, this work analyses and states the various methodologies that focuses on aspect based sentimental analysis. The implementation of this approach, is outside the scope of this paper.","PeriodicalId":436733,"journal":{"name":"2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133414670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}