{"title":"Detecting Malicious Nodes in IoT Networks Using Machine Learning and Artificial Neural Networks","authors":"Kazi Kutubuddin Sayyad Liyakat","doi":"10.1109/ESCI56872.2023.10099544","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10099544","url":null,"abstract":"Thanks to a relatively new technology known as the Internet of Things, devices can now easily and wirelessly share data with one another over the internet or other networked systems (IoT). Despite these benefits, IoT systems are now more vulnerable to hacker attacks, which could have neg-ative consequences. This is due to the ongoing expansion of the IoT ecosystem. These incursions have the potential to cause fi-nancial and physical harm. The IoT is a network that config-ures itself automatically. This network is susceptible to a varie-ty of attacks, all of which can be started by rogue nodes. For instance, during a denial of service attack, a malicious node bombards a targeted node with a large number of packets. For the purpose of locating these malicious nodes in a network, a threshold-based procedure utilising cutting-edge machine learning techniques is launched. By checking the path latency and alerting on it if it exceeds a set threshold value, the sug-gested method can help identify an attacker node. The NS2 programme will be used to mimic the suggested method. We evaluate the suggested methodology and demonstrate that our system performs well in terms of a number of measures, such as throughput, latency, and packet loss.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128243023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ehsanur Rahman Rhythm, Rajvir Ahmed Shuvo, Md Sabbir Hossain, Md. Farhadul Islam, Annajiat Alim Rasel
{"title":"Sentiment Analysis of Restaurant Reviews from Bangladeshi Food Delivery Apps","authors":"Ehsanur Rahman Rhythm, Rajvir Ahmed Shuvo, Md Sabbir Hossain, Md. Farhadul Islam, Annajiat Alim Rasel","doi":"10.1109/ESCI56872.2023.10100214","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10100214","url":null,"abstract":"In this study, we conducted sentiment analysis on restaurant reviews from Bangladeshi food delivery apps using natural language processing techniques. Food delivery apps have become increasingly popular in Bangladesh, and understanding the sentiment of customer reviews can provide valuable insights for restaurant owners and food delivery app companies. In this research, we have created a dataset named “Bangladeshi Restaurant Reviews” by gathering customer reviews of restau-rants available on Foodpanda and Hungrynaki, which are two popular food delivery apps in Bangladesh. We used Robustly Optimized BERT Pretraining Approach (RoBERTa), AFINN, and DistilBERT, a distilled version of Bidirectional Encoder Repre-sentations from Transformers (BERT) to perform the sentiment analysis. Overall, this research paper highlights the importance of sentiment analysis in the food delivery industry and demonstrates the effectiveness of different models in performing this task. It also provides insights for businesses looking to use sentiment analysis to improve their services and products. The accuracy of the models evaluated, RoBERTa, AFINN, and DistilBERT, were 74%, 73 %, and 77 % respectively.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134559939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Kirange, Vijay S Patil, Krunalkumar Gandhi, N. S. Mahajan, D. S. Patil, Rupesh S. Patil
{"title":"Evaluation of Induction Motor Drives Efficiency using ARM-7 based VSI","authors":"Y. Kirange, Vijay S Patil, Krunalkumar Gandhi, N. S. Mahajan, D. S. Patil, Rupesh S. Patil","doi":"10.1109/ESCI56872.2023.10099485","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10099485","url":null,"abstract":"The industries that are dependent on three-phase power never sustain the single or two phase failure because three-phase power provides greater reliability than that from a single or two-phase power source in today's competitive environment. When any one of the phases in an electrical circuit fails, the equipment it powers is more likely to function improperly, and it could even stop working altogether. There is a discussion in this paper of the development of a ‘Voltage Source Inverter’ for a ‘Three Phase Induction Motor’ that includes a Three Phase Preventer. This inverter has the potential to be applied to a wide variety of industrial applications that demand a continuous three-phase power supply. The goal of this study is to figure out how to build a system that uses a 3 ph. power source to supplement a single-phase one. An Arm-7 controller is programmed for gate pulse of pulse generator, which will allow the desired result to be attained. There is optoisolator and gate driver circuitry attached to this controller, and a MOSFET is used to link it to a power inverter. The foremost goal of this study is to implement a 3 ph. 6 trigger, isolated pulse using an ARM-7 controller. When one of the phases is missing from a three-phase supply in the RYB sequence, this ‘automatic phase selection circuit’ chooses the current phase to consider as a single phase with neutral, protecting a 3 Ph. preventer fortified induction motor from single-phasing damage. The induction motor is powered by 350 volts of three-phase alternating current (AC) that is generated by an inverter circuit. The power circuit transforms 230 V of 1 Ph. AC to DC 350 V. In order to deliver the three-phase variable frequency supply that is essential for adjusting the speed of induction motors in a diversity of manufacturing applications, the circuit has been built.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"520 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134435658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Greetings from Hon'ble Minister","authors":"","doi":"10.1109/esci56872.2023.10100325","DOIUrl":"https://doi.org/10.1109/esci56872.2023.10100325","url":null,"abstract":"","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134507258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Task Board: Complete web accessible solution to modern task management","authors":"Shantanu Joshi, P. P. Joshi","doi":"10.1109/ESCI56872.2023.10100154","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10100154","url":null,"abstract":"Task management systems are a crucial way of tracking daily work to increase efficiency and produce higher throughput, used by all people from different walks of life. Though there are many tools designed for tracking work activity, there is no tool which provides accessibility measures for all the disabilities categories like Auditory, Cognitive/Neurological, Physical/Motor, Visual, Speech as stated by WCAG (Web Con-tent Accessibility Guidelines). Considering a single person can undergo multiple disabilities at same time, it becomes impossible for them to use a task management system. The purpose of this research is to integrate accessibility solutions for each individual disability category into a single solution, addressing all four WCAG accessibility principles, thus making it Perceivable, Operable, Understandable and Robust. As a result, developing a Smart task management system accessible to every single individual.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132235968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saja Al-Dabet, A. Elmassry, Ban AlOmar, Abdullah Alshamsi
{"title":"Transformer-based Arabic Offensive Speech Detection","authors":"Saja Al-Dabet, A. Elmassry, Ban AlOmar, Abdullah Alshamsi","doi":"10.1109/ESCI56872.2023.10100134","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10100134","url":null,"abstract":"The prevalence of social media platforms prompted detecting any language that is intended to harm or intimidate another person or group of people in online posts and comments. On Twitter, for instance, users are susceptible to cyberbullying and hate speech, which may develop into physical and psychological violence. A transformer-based approach is presented in this study to address the offensive speech detection issue. This model employs versions of the CAMeLBERT model and is validated using a mixture of four benchmark Twitter Arabic datasets annotated for hate speech detection task, including the (OSACT5 2022) workshop shared task dataset. The presented model was capable of recognizing Arabic tweets containing offensive speech with 87.15 % accuracy and 83.6 % F1 score.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131035129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Smart Pet Food Dispenser using Embedded System","authors":"Ekta Jain, Sakshi Badwaik, Sampada Khirwadkar, Shruti Thakare, Mayur Uike, P. Chandankhede","doi":"10.1109/ESCI56872.2023.10100166","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10100166","url":null,"abstract":"The project's goal is to create an Internet of Things-based autonomous pet feeding system (IoT). Here, we're creating a feeder for pets and owners that may be used whenever a pet owner is away from home and unable to feed their animals normally. Pets will become obese if we give them free food. This device will also be used to train pets to eat on schedules by keeping track of their feeding patterns. The objective of the following project is to develop automatic pet feeding with the Internet of Things (IoT). Here we are developing a feeder for the pets and the owners that whenever a pet owner is outside the residence and unable to feed his or her pets normally. When we freely feed pets, it will cause obesity in pets. This machine will also be used to monitor the pet's eating habits to train the pets for scheduled meals.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130405391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach for Copy-Move and Image Splicing Forgery Detection using Automated Deep Learning","authors":"Krishna H. Hingrajiya, Chintan Patel","doi":"10.1109/ESCI56872.2023.10100202","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10100202","url":null,"abstract":"Image forgery detection plays a vital role for thorough incident investigation and social media crime preventions. An innovative approach for image forgery detection by utilizing a DenseNet-201 convolutional neural network is presented. The proposed method utilizes DenseNet-201 architecture to extract features from an input image and then uses a fully connected layer to classify the image as either genuine or forged. The model is trained on a dataset of authenticated and forged images and evaluated on a separate test set. The results show that the proposed approach achieves an accuracy of 94.12 %, outperforming existing methods. It demonstrates that the proposed model can accurately detect image forgeries across a wide range of image types. Also, the model is evaluated on various image transformations, like scaling, rotation, and translation. Furthermore, the proposed approach is computationally efficient, making it suitable for real-time applications.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124158447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Environmental Monitoring and Disease Detection Using Internet of Things","authors":"H. R, Diana D C, V. B","doi":"10.1109/ESCI56872.2023.10099740","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10099740","url":null,"abstract":"Environmental dangers cause up to a quarter of the world's illness burden, and a growing lack of understanding about health monitoring has sparked serious worry in today's culture. So, in this paper, we propose a system for monitoring both the environment and human health. People will be able to better grasp the consequences of increased chemicals and other dangerous radiations on their health as a result of detect the presence of these compounds, as well as the presence of disease-causing enzymes in one'0073 breath which will act as an alarming signal for any potential disease to be present and early precautions can be taken. This proposed system is particularly developed for those who operate in hazardous areas, allowing them to regularly evaluate the conditions of their surrounds as well as their own health. As a result, we named our product “sentinel kit” because it functions as a sentinel for the user both in work and household environment.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"267 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122860116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real Time Face Recognition Based Attendance System using Multi Task Cascaded Convolutional Neural Network","authors":"Vrushaket Chaudhari, Shantanu Jain, Rushikesh R. Chaudhari, Tanvesh Chavan, Priyanka Shahane","doi":"10.1109/ESCI56872.2023.10099879","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10099879","url":null,"abstract":"Facial recognition has been an important research direction in computer vision. There are countless algorithms presented in related disciplines, and the precision that may be achieved is increasing. However, the implementation of facial recognition technology is hard. In this paper, combination of facial recognition and facial recognition algorithms to build a video-based facial recognition system to efficiently and accurately mark participant attendance. Utilizing FaceNet to extract characteristics and use MTCNN to detect the image of the student for recognition. Lastly, the output is analyzed by a Support Vector Machine (SVM) that recognizes the person of interest in the image. Studies reveal that this technique still yields accurate detection results when the dependent variable has no data and the image quality is unreliable. On the self-generated data set used in this article, the accuracy of the procedure may reach 94.85%.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121222197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}