ISBN-13: 9781032484105 / Angielski
ISBN-13: 9781032484105 / Angielski
The increase in computing power and sensor data has driven Information Technology on end devices, such as smart phones or automobiles. The widespread application of IT across the globe includes manufacturing, engineering, retail, e-commerce, health care, education, financial services, banking, space exploration, politics (to help predict the sentiments of voter demographics), etc. The papers in this conference proceeding examine and discuss various interdisciplinary researches that could accelerate the advent of Information Technology.
The increase in computing power and sensor data has driven Information Technology on end devices, such as smart phones or automobiles. The widespread application of IT across the globe includes manufacturing, engineering, retail, e-commerce, health care, education, financial services, banking, space exploration, politics (to help predict the sentiments of voter demographics), etc.
The papers in this conference proceeding examine and discuss various interdisciplinary researches that could accelerate the advent of Information Technology.
List of Figures
List of Tables
Foreword
Preface
About the Editors
Introduction
Details of Programme Committee
1. S-Café—A Smart Ubiquitous Chatbot-based Café for Human Motional Analysis and Coffee Brewing 1
S. Arun, SaiSucharitha K, Mohamed Anees F. and K. Kalaivani
2. A Deep Hybrid Neural Network Model to Detect Diabetic Retinopathy from Eye Fundus Images 8
Guntaka Rama Mounika and Kamepalli Sujatha
3. Optimization of Power Generation Costs Using Support Vector Machines 17
A.R.Danila Shirly, M. V. Suganyadevi, S. Rochan Rohan, P. S. Shakkthi Naresh, S. Reehan Fazil, B. Rithesh and A. Shunmugalatha
4. Masked Face Recognition by Reconstructing Face Using Image Inpainting with GAN 26
Jinal Bhagat and Mahesh Goyani
5. Deep Learning-Based Heart Sounds Classification Using Discrete Wavelet Transform Features 35
Sabeena Yasmin Hera and Mohammad Amjad
6. Optimal Allocation of Resources in Data Center using Artificial Intelligence 41
D. Kalpanadevi, P. Babysudha, K. Kartheeban and M. Mayilvaganan
7. Flower Leaf Image Classification using Deep Learning Techniques 51
Bittu Kumar Aman and Vipin Kumar
8. Vehicle Monitoring System Detection Using Deep Learning Technique 61
K. Arthi, S. Suchitra, A. Shobanadevi and K. Sharon Babu
9. Edge Detection System for Object Detection and Alert Generation 69
E. Kamalanaban, P. Selvarani, S. K. Manigandan, V. Sabapathi, Roja K. and Roshini P.
10. Pest Classification in Paddy by Using Deep ConvNets and VGG19 75
R. Elakya and T. Manoranjitham
11. Detection of Sink Hole Attack Using Ripemd Algorithm in Wireless Sensor Networks 85
Stella K., Nisha A. P., Manjushree S. and Vethapackiam K.
12. DarkNet for Brain Tumor Detection and Classification 94
Deepa P. L., D. Narain Ponraj and Sreena V. G.
13. IOT Based Smart Sprinkling System in Farming 102
Stella K, Ranjith Kumar S., Sathish Kumar M. and Rajesh Kumar M
14. Design and Development of LoRaWAN Based Module for Pulse Output Water Meter 108
Vivek B. M. E., Shridhar M., Snega S., Sugamathi R. and Kavin Prakash T.
15. Face Emotion Recognition Using Histogram of Oriented Gradient (HOG) Feature Extraction and Neural Networks 114
Sheriff M., Jalaja S., Dinesh Kumar T. R., Pavithra J., Yerramachetty Puja, and Sowmiya M.
16. Historical Document Analysis Using Deep Learning 123
S. Devi, M. Rajalakshmi, R. Saranya, G. Swathi, and K. Selvi
17. IoT Based—Low Cost Smart Solar Panel Power Monitoring System Using Arduino and ESP8266 129
Prabaakaran K., Anto Bennet, Senthil Kumar R., Jayasurya E., Kocherla Narendra, and Saravanan R.
18. Segmentation of Corpus Callosum from MRI Images 134
A. Padmanabha Sarma, and G. Saranya
19. Quality Indexing of Reclaimed Water using Internet of Things for Irrigation Purpose 139
S. Vishnu Kumar, E. Balasubramanian, G. Aloy Anuja Mary and M. Kumaresan
20. Energy Efficient Heuristic Best Search Approach for Scheduling Virtual Machines in the OpenNebula Cloud 146
Abisha D. and Aishwaryalakshmi R. K.
21. Fire Detection and Alert System Using Deep Learning 158
Sathishkumar B. R., Nivyadharsini N. and Niranjana T.
22. EMO Player Using Deep Learning 167
Sathishkumar B. R., Shreya V, Sujitha R. and Thilaga M.
23. Impact Assessment on the Factors Affecting the Crop Yield Using Data Analytics and Principal Component Analysis 175
Bharati Panigrahi, Krishna Chaitanya Rao Kathala and Koteswara Rao Seelam
24. Automatic Parking System with Dynamic Tariff and Allotment of Optimum Parking Space 182
Harshavardhan Naidu S., Senthil Kumar R., Santhoshkumar H., Kubera Rajan V. G., Sugavanam K. R. and Prabaakaran K.
25. Parametric Study to Improve Forecasting Accuracy in Air Quality Data 187
Shobha K.
26. Smart Agriculture Monitoring System—Weed Detection and Predicting Soil Moisture and Weather 195
M. Senthamil Selvi, S. Jansi Rani, V. K. Nivetha, C. Sruthi and Rahman Shafeeq
27. Extraction and Analysis of Snow Covered Area from High Resolution Satellite Imageries 202
Kodge B. G.
28. A Customized Deep Convolutional Neural Network for Covid-19 Detection 208
M. Dhilsath Fathima, R. Hariharan, Sachi Shome, Tamilarasan P., V. Vijeya Kaveri and R. Natchadalingam
29. Real Time Face Mask Detection Using Mobilenetv2 Algorithm 215
M. Dhilsath Fathima, R. Hariharan, Prashant Kumar Singh, Praveen Kumar, S. Ramya and M. Seeni Syed Raviyathu Ammal
30. Artificial Intelligence in the Field of Textile Industry: A Systematic Study on Machine Learning and Neural Network Approaches 222
Dennise Mathew and N. C. Brintha
31. An Adaptive Feature Weight Using Hybrid Fire Fly with Harmony Optimization Algorithm on Feature Selection and Evaluating the Performance on Multi-Layer Perceptron with Hepatocellular Carcinoma Data 229
C. Saranya Jothi, Carmel Mary Belinda, Eskandhaa K. Vel and Karthiha K. Vel
32. Optimal and Dynamic Allocation of Efficient Data Center in Cloud Computing for Big Data Applications 237
D. Sugumaran, Rajesh G., Syed Fiaz A. S. and Jayanthi K.
33. Innovative IoT-based Predictive Control and Monitoring Algorithm for Industrial Safety 243
Gokul M. and Rajathi K.
34. Blind Source Separation in the Presence of AWGN Using ICA-FFT Algorithms a Machine Learning Process 252
M. R. Ezilarasan, Rajesh G., Vinoth Kumar R. and K. Aanandhasaravanan
35. Analysis of the System size of a Finite Capacity M/M/C Queueing System with Synchronised Vacations and Impatient Customers 261
C. T. Dora Pravina, S. Sreelakshmi, T. Karthikeyan and Prakash M.
36. AUBIT: An Adaptive User Behaviour Based Insider Threat Detection Technique Using LSTM-Autoencoder 267
Ambairam Muthu Sivakrishna, R. Mohan and Krunal Randive
37. Segmentation of Brain MRI Images Using U-Net 275
Ramya D., C. Suryapunith, B. V. Satyendra Reddy, S. Mythri, B. Kalicharan
S. K. Manigandan
38. Forecasting COVID-19 Cases Using Machine Learning 282
Ramya D., Deepa J., Surya Srinivasan, P. S. Karthik Srinath, S. K. Manigandan and J. Velmurugan
39. Efficient Pollutants Assessment of Larger Water-Bodies using Sentinel-2 MSI 289
Kumaresan M., E. Balasubramanian, S. Vishnu Kumar and Ch Nirmal Prabhath
40. Safety and Legal Measures to Protect Women from Cyber Crimes 298
Sridevi J., M. S. R. Mariyappan and Eskandhaa K. Vel
41. Swin Transformer Based COVID-19 Identification and its Severity Quantification 304
Deepa J., Ramya D., K. S. Rishab, Sachi Shome, S. K. Manigandan and J. Velmurugan
42. Dissertation on Password Space of Disparate Graphical User Authentication Systems 313
Shanthalakshmi M. and Ponmagal R. S.
43. Convolutional Neural Network Based Image Steganography 321
Lijetha C. Jaffrin, P. N. Karthikayan, Soumik Datta, and Arjit Majumdar
44. Smart Digilocker Using IoT 332
S. Shanmuga Priya, R. Umamaheswari, S. Uma and R. Ganesan
45. Cybersecurity and Artificial Intelligence: A Systematic Literature Review 339
R. Srinivasan, M. Kavitha, R. Kavitha and Uma S.
46. Weighted Support Vector Machine Classification by using Confidence Parameters for Unbalanced Sampling Target Data Sets 346
M. Premalatha and C. Vijayalakshmi
47. Regional Stores Products Recommender Using Attention-Based Long-Term Short-Term Memory 352
P. N. Karthikayan, Lijetha C. Jaffrin, R. Saravana Perumal, Bhavishya P., and Yugandhar Surya
48. Single Product Inventory System Serving Israeli Queued Customers with Batch Service and Instantaneous Replenishment Policy 362
T. Karthikeyan, J. Viswanath, C. T. Dora Pravina and J. Vijayarangam
49. Solving Assignment Problem and Game Theory Using Graph Theory 370
N. Kalaivani and E. Mona Visalakshidevi
50. Real Time Video Instance Segmentation Using Mask RCNN 377
R. Hariharan, M. Dhilsath Fathima, B. Prakash, S. Abi Sundar, E. Punith, and M. Mohammed Muzameel Hussain
51. Ingenious Concepts of Machine Learning Towards Furtherance 385
Bhavani M and M. Durgadevi
52. Converter with Analog MPPT for a Photovoltaic Water Pumping System: High Efficiency and Low Cost 392
K. Prabu, S. Irudayaraj and P. Chandrasekar
53. Prediction of Pediatric Cardiomyopathy Genes Associations Using N2V- LSTM 402
K Jayanthi*, C. Mahesh, D Sugumaran and S. Sithsabesan
54. Video Surveillance for Intruder Detection and Tracking 409
Vijayakumar R., Vijay K., S. Muruganandam, S. Ravikumar and Kirubasri G.
55. Dynamic Request Redirection and Workload Balancing of Cloud in Business Applications 416
Vijay K. and K. Jayashree
56. Deep Dive on Oversampling and Under Sampling Techniques in Machine Learning 423
Vijay K., Manikandan J., Babu Rajendiran, Sowmia K. R., and Eugene Berna I.
57. Water Qulaity Monitoring and Notification System Based on Arduino, MATLAB and Visualization Techniques 431
Ravikumar S., Vijay K., Bhuvaneswaran B., Babu Rajendiran and Vidhya S.
58. Computational Drug Discovery Using QSAR Modeling 438
Deepa J., R. Naveen, Kambam Aneka, J. Velmurugan, Uma Rani V. and Merry Ida
59. Biomedical Image Segmentation Using Enhanced U-NET 446
Hariharan R, Mohan R, Krunal Randive, Toonesan T. A. and Abi Sundar S.
60. A Survey of Relevance Prediction Based Focused Web Crawlers on the Web 455
Sakunthala Prabha K. S. and Mahesh C.
61. IndexedByText 462
Arthi A., Mahesh, Abu M., Muthuraj M. and Sanjay Gnanam U.
62. IOT Based Non Invasive Blood Glucose Level Monitoring 471
Vidhya S., Swetha S., Pradeep R., Vijay K. and Sowmia K. R.
63. Bio Bank–An Innovation Authentication System for B2B Transaction 477
S. Vidhya, S. Amudha and S. Ravi kumar
64. A Cloud Based Healthcare Data Storage System Using Encryption Algorithm 486
M. Jaeyalakshmi, Vijay K., Jayashree K. and Priya Vijay
65. Deduplication in Cloud Computing for Heterogeneous Data Storage Management 492
Vijay K., Pradeep R., Sorna Shanthi D., Sowmia K. R., and Eugene Berna I.
66. Application of Neutrosophic Network Using Efficient Domination 499
J.Senbagamalar, A. Meenakshi, T. Kujani and A. Kanchana
67. A Comparative Study of CPM Analysis in the Fuzzy and Neutrosophic Environment 507
T. Nagalakshmi and J. Shivangi Mishra
68. Secret Sharing of Information using First Order ODE and Variable Separable Method 515
Nagadevi Bala Nagaram, Kala Raja Mohan, Sathish Kumar Kumaravel and Suresh Rasappan
69. A Cryptographic Technique Using Conformal Mapping 519
Kala Raja Mohan, Nagadevi Bala Nagaram, Regan Murugesan and Suresh Rasappan
70. Average Resolving Number of a Fuzzy Graph and its Application in Network Theory 524
R. Shanmugapriya, M. Vasuki and P. K. Hemalatha
D. Sugumaran working as an Associate Professor in the Department of Information Technology, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, Chennai, Tamil Nadu, India, since 2013. He is having 18 years of teaching experience and 3 years of industrial experience. He has Published numbers of research articles in various Journals. Apart from teaching He has been actively involving in software designing and development activities. In his education career he has received Bachelor of Computer Science degree in 1997 from AVC College, Mayiladuthurai affiliated to Bharathidasan University, Trichy, Tamil Nadu, India. He completed and received his Master of Computer Application degree in 2000 from S.K.S.S Arts College, Bharathidasan University, Trichy, Tamil Nadu, India and Master of Engineering (Computer Science) degree in 2009 from Vel Tech Multi Tech Engineering College, Anna University, Chennai, Tamil Nadu, India He completed doctorate of philosophy in computer science and engineering in Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, Chennai, Tamil Nadu, India.
Souvik Pal is an Associate Professor in the Department of Computer Science and Engineering at Sister Nivedita University (Techno India Group), Kolkata, India. Prior to that, he was associated with Global Institute of Management and Technology; Brainware University, Kolkata; JIS College of Engineering, Nadia; Elitte College of Engineering, Kolkata; and Nalanda Institute of Technology, Bhubaneswar, India. Dr. Pal received his MTech, and PhD degrees in the field of Computer Science and Engineering from KIIT University, Bhubaneswar, India. He has more than a decade of academic experience. He is author or co-editor of more than 15 books from reputed publishers, including Elsevier, Springer, CRC Press, and Wiley, and he holds three patents. He is serving as a Series Editor for “Advances in Learning Analytics for Intelligent Cloud-IoT Systems”, published by Scrivener-Wiley Publishing (Scopus-indexed); “Internet of Things: Data-Centric Intelligent Computing, Informatics, and Communication”, published CRC Press, Taylor & Francis Group, USA; “Conference Proceedings Series on Intelligent Systems, Data Engineering, and Optimization”, published CRC Press, Taylor & Francis Group, USA; Dr. Pal has published a number of research papers in Scopus/SCI/SCIE Journals and conferences. He is the organizing chair of RICE 2019, Vietnam; RICE 2020 Vietnam; ICICIT 2019, Tunisia. He has been invited as a keynote speaker at ICICCT 2019, Turkey, and ICTIDS 2019, 2021 Malaysia. He has also served as Proceedings Editor of ICICCT 2019, 2020; ICMMCS 2020, 2021; ICWSNUCA 2021, India. His professional activities include roles as Associate Editor, Guest Editor, and Editorial Board member for more than 100+ international journals and conferences of high repute and impact. His research area includes cloud computing, big data, internet of things, wireless sensor network, and data analytics. He is a member of many professional organizations, including MIEEE; MCSI; MCSTA/ACM, USA; MIAENG, Hong Kong; MIRED, USA; MACEEE, New Delhi; MIACSIT, Singapore; and MAASCIT, USA.
Dac-Nhuong Le (Lê Đắc Nhường) has an M.Sc. and Ph.D. in computer science from Vietnam National University, Vietnam in 2009 and 2015, respectively. He is an Associate Professor on Computer Science, Deputy Head of Faculty of Information Technology, Haiphong University, Vietnam. He has a total academic teaching experience of 15+ years with many publications in reputed international conferences, journals, and online book chapter contributions (Indexed By: SCI, SCIE, SSCI, Scopus, ACM, DBLP). His area of research includes Soft computing, Network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT, and Image processing in biomedical. His core work in network security, soft computing and IoT, and image processing in biomedical. Recently, he has been on the technique program committee, the technique reviews, the track chair for international conferences under Springer-ASIC/LNAI Series. Presently, he is serving on the editorial board of international journals and he authored/edited 20+ computer science books by Springer, Wiley, CRC Press.
Noor Zaman Jhanjhi is currently working as Associate Professor | Director Center for Smart society 5.0 [CSS5], and Cluster Head for Cybersecurity cluster, at School of Computer Science and Engineering, Faculty of Innovation and Technology, Taylor’s University, Malaysia. He is supervising a great number of Postgraduate students mainly in cybersecurity for Data Science. CSS5 has extensive research collaboration globally with several institutions and professionals. Dr. Jhanjhi is Associate Editor and Editorial Board for several reputable journals including PeerJ Computer Science, Frontier Journals, etc. PC member for several IEEE conferences worldwide, and guest editor for reputed indexed journals. Active reviewer for a series of Q1 journals has been awarded globally as a top 1% reviewer by Publons (Web of Science). He has been awarded an outstanding Associate Editor by IEEE Access for the year 2020. He has high indexed publications in WoS/ISI/SCI/Scopus, and his collective research Impact factor is more than 700 points as of the first half of 2022. He has international Patents on his account and edited/authored more than 40 research books published by world-class publishers. Including Springer, CRC Press, IGI Global USA, Wiley, Intech Open Science, Eliva Press, etc. He has great experience in supervising and co-supervising postgraduate students, and an ample number of 20 plus PhD and Master’s students graduated under his supervision. He is an external PhD/Master thesis examiner/evaluator for several universities globally. He has completed more than 25 international funded research grants successfully. He has served as a Keynote/Invited speaker for more than 40 international conferences, presented several Webinars worldwide, and chaired international conference sessions. His research areas include Cybersecurity, IoT security, Wireless security, Data Science, Software Engineering, and UAVs.
Dr. Jhanjhi has an intensive background of academic quality accreditation in higher education besides scientific research activities, he had worked for academic accreditation for more than a decade and earned ABET accreditation twice for three programs at the college of computer sciences and IT, King Faisal University Saudi Arabia. He also worked for National Commission for Academic Accreditation and Assessment (NCAAA), Education Evaluation Commission Higher Education Sector (EECHES) formerly NCAAA Saudi Arabia, for institutional level accreditation. He also worked for the National Computing Education Accreditation Council NCEAC) Pakistan. He has experience in teaching advanced era technological courses including, Mobile Application Development (Android), Cloud Computing, Mobile Computing, Wireless Networks and Security, Secure Software Systems, Computer Security, .Net Framework programming, etc. besides other undergraduate and postgraduate courses. Postgraduation supervision, graduation projects, internships, and thesis supervision.
1997-2024 DolnySlask.com Agencja Internetowa