Pub Date : 2022-07-21DOI: 10.36548/jtcsst.2022.2.005
C. M. Nalayini, P. Sreemathi, B. Nanditha
Now-a-days human beings have a tendency to transport in a faster pace which leads to greater street injuries. During night time motors typically tour in more velocity. When an coincidence happens in the course of night it is difficult for the rescue team to right away locate the place and shop the humans. This document gives a machine to robotically alternate between high and low beams with the aid of dimming the headlight of the different vehicles. Automatic collision prevention and detection is the device anticipated. It will become aware of a auto crash, and then ship the vital facts to the hospitals. This gadget substantially helps cars that have indulged in an accident in the search and rescue. The pace of the motors is one of the important reasons. If emergency offerings should achieve facts about accidents and attain them early, many lives can be saved. GPS has now end up a part of a vehicle framework. A GPS recipient is successful of checking the vehicle speed and recognizing mishaps dependent absolutely upon oversaw speed and sending an accident region to an Alert Service Center. We have put collectively an automated headlight dimmer prototype to stop such incidents. This adjusts the excessive beam routinely into the low beam, which reduces the depth of light by way of sensing the automobile approaching. It additionally eliminates the want for manual driver switching that is no longer constantly done. This paper talks about in element the building and blessings of this model.
{"title":"Deterrence of Accident Using IoT","authors":"C. M. Nalayini, P. Sreemathi, B. Nanditha","doi":"10.36548/jtcsst.2022.2.005","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.005","url":null,"abstract":"Now-a-days human beings have a tendency to transport in a faster pace which leads to greater street injuries. During night time motors typically tour in more velocity. When an coincidence happens in the course of night it is difficult for the rescue team to right away locate the place and shop the humans. This document gives a machine to robotically alternate between high and low beams with the aid of dimming the headlight of the different vehicles. Automatic collision prevention and detection is the device anticipated. It will become aware of a auto crash, and then ship the vital facts to the hospitals. This gadget substantially helps cars that have indulged in an accident in the search and rescue. The pace of the motors is one of the important reasons. If emergency offerings should achieve facts about accidents and attain them early, many lives can be saved. GPS has now end up a part of a vehicle framework. A GPS recipient is successful of checking the vehicle speed and recognizing mishaps dependent absolutely upon oversaw speed and sending an accident region to an Alert Service Center. We have put collectively an automated headlight dimmer prototype to stop such incidents. This adjusts the excessive beam routinely into the low beam, which reduces the depth of light by way of sensing the automobile approaching. It additionally eliminates the want for manual driver switching that is no longer constantly done. This paper talks about in element the building and blessings of this model.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127690688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-13DOI: 10.36548/jtcsst.2022.2.002
I. Jeena Jacob
Every day, new systems and devices are being developed, and research in this human and computer interaction field has increased dramatically over the previous several decades. Research into how computers impact people's lives, organizations, and society as a whole is done via the field of Human-Computer Interaction (HCI). This involves not just the simplicity of use but also innovative interaction approaches for supporting user activities, offering better access to information through new HCI principle, and establishing more powerful forms of communication for the user. After contemplating its potential, HCI is currently a popular new study topic among academics with feedback and recommendation by yes or no. To make HCI an effective tool, it must learn from the new principles of HCI that is planned here for future and reconsider some of its fundamental concepts.
{"title":"Review on Human Computer Interaction Intelligent Learning for Improved Identification Procedure","authors":"I. Jeena Jacob","doi":"10.36548/jtcsst.2022.2.002","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.002","url":null,"abstract":"Every day, new systems and devices are being developed, and research in this human and computer interaction field has increased dramatically over the previous several decades. Research into how computers impact people's lives, organizations, and society as a whole is done via the field of Human-Computer Interaction (HCI). This involves not just the simplicity of use but also innovative interaction approaches for supporting user activities, offering better access to information through new HCI principle, and establishing more powerful forms of communication for the user. After contemplating its potential, HCI is currently a popular new study topic among academics with feedback and recommendation by yes or no. To make HCI an effective tool, it must learn from the new principles of HCI that is planned here for future and reconsider some of its fundamental concepts.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Current trending- Internet of things (IoT) is internetworking of an assortment of hardware devices to offer a collection of applications and services. In the present-day world, ransomware cyber-attack has become one of the major attacks in IoT systems. Ransomware is a hazardous malware that targets the user’s computer inaccessible or inoperative, and then requesting the computer victim user to transfer a huge ransom to relapse the damage. At instance, the evolution rate outcomes illustrate that the level of attacks such as Locky and Cryptowall ransomware are conspicuously growing then other ransomware. Thus, these ransomware relations are the latent threat to IoT. To address the issue, this paper presents Two-phase ransomware prediction model based on the behavioral and communication study of Cryptowall ransomware for IoT networks. This proposed Two-phase model equipped with, Phase-1: observes the inward TCP/IP flowing traffic through a monitoring server to avert the ransomware attack The procedure of the monitoring server is to monitor the IoT's TCP/IP. The process of Monitoring TCP/IP is to extract TCP/IP header and routines command and control (C&C) server IP blacklisting to discover the ransomware attacks. In Phase-2: the proposed system will also analyze the application pattern for malicious behavior of the Web and URLs. Several societies have very affluent security tools in their milieu, but their events or logs are not monitored, which make affluent tools ineffective. The process of having efficient security based monitoring server is vital for detecting and controlling the ransomware attack.
{"title":"A Study on Two-Phase Monitoring Server for Ransomware Evaluation and Detection in IoT Environment","authors":"Amirthasaravanan Arivunambi, Arjun Paramarthalingam","doi":"10.36548/jtcsst.2022.2.003","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.003","url":null,"abstract":"Current trending- Internet of things (IoT) is internetworking of an assortment of hardware devices to offer a collection of applications and services. In the present-day world, ransomware cyber-attack has become one of the major attacks in IoT systems. Ransomware is a hazardous malware that targets the user’s computer inaccessible or inoperative, and then requesting the computer victim user to transfer a huge ransom to relapse the damage. At instance, the evolution rate outcomes illustrate that the level of attacks such as Locky and Cryptowall ransomware are conspicuously growing then other ransomware. Thus, these ransomware relations are the latent threat to IoT. To address the issue, this paper presents Two-phase ransomware prediction model based on the behavioral and communication study of Cryptowall ransomware for IoT networks. \u0000This proposed Two-phase model equipped with, Phase-1: observes the inward TCP/IP flowing traffic through a monitoring server to avert the ransomware attack The procedure of the monitoring server is to monitor the IoT's TCP/IP. The process of Monitoring TCP/IP is to extract TCP/IP header and routines command and control (C&C) server IP blacklisting to discover the ransomware attacks. \u0000In Phase-2: the proposed system will also analyze the application pattern for malicious behavior of the Web and URLs. Several societies have very affluent security tools in their milieu, but their events or logs are not monitored, which make affluent tools ineffective. The process of having efficient security based monitoring server is vital for detecting and controlling the ransomware attack.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-27DOI: 10.36548/jtcsst.2022.2.001
K. Geetha
An enormous wave of automation technology is about to hit the global market. To save thousands of people's lives, autonomous vehicle technology may decrease congestion and increase mobility, as well as may enhance the productivity of the transportation industry. Developed country governments, on the other hand, are concerned that they may be placing unneeded or unforeseen obstacles on the path of growth. As a result, when it comes to features, safety always comes first. With the help of various functions based on certain automation technologies, this effort attempts to find example ideas. A more technical look at the needs throughout the development to minimize safety-related dangers is presented in this paper, which is meant to augment previous publications on different safety elements. This article emphasizes the significance of safety by design. Additionally, the goal of this article is to overcome the problems of the existing system with authentication and security architecture framework.
{"title":"Automated Driving Safety Framework through Security Architecture - Survey","authors":"K. Geetha","doi":"10.36548/jtcsst.2022.2.001","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.001","url":null,"abstract":"An enormous wave of automation technology is about to hit the global market. To save thousands of people's lives, autonomous vehicle technology may decrease congestion and increase mobility, as well as may enhance the productivity of the transportation industry. Developed country governments, on the other hand, are concerned that they may be placing unneeded or unforeseen obstacles on the path of growth. As a result, when it comes to features, safety always comes first. With the help of various functions based on certain automation technologies, this effort attempts to find example ideas. A more technical look at the needs throughout the development to minimize safety-related dangers is presented in this paper, which is meant to augment previous publications on different safety elements. This article emphasizes the significance of safety by design. Additionally, the goal of this article is to overcome the problems of the existing system with authentication and security architecture framework.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130380793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-19DOI: 10.36548/jtcsst.2021.4.006
H. Andi
Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location. A reliable shielding approach will protect the data stored in the cloud from the hackers and malwares. Blockchain is one of the recent technologies implemented to the cloud network for storing the location of the saved data in an encrypted ledger format. This saves the stored data location without exploring it to the hacker’s algorithm. Hence the hacking algorithm fails by not knowing the location to be targeted. Deep learning is an advanced technique developed to act like that of the human neurological analysis on several problems. Implementation of deep learning algorithm to the cloud security module identifies the movement of malware and spywares in the cloud storage. Similarly the cryptography is an old technique structured to hide the information with a cover data or cover image. It allows the hacking algorithm to extract only the useless data. This paper reviews the recent advancements in the cloud security with blockchain, deep learning and cryptographic models.
{"title":"Estimating the Role of Blockchain, Deep Learning and Cryptography algorithms in Cloud Security","authors":"H. Andi","doi":"10.36548/jtcsst.2021.4.006","DOIUrl":"https://doi.org/10.36548/jtcsst.2021.4.006","url":null,"abstract":"Cloud network has become very popular in recent days due to its accessibility merits. The data stored in the cloud environment are accessible by the clients from any location. A reliable shielding approach will protect the data stored in the cloud from the hackers and malwares. Blockchain is one of the recent technologies implemented to the cloud network for storing the location of the saved data in an encrypted ledger format. This saves the stored data location without exploring it to the hacker’s algorithm. Hence the hacking algorithm fails by not knowing the location to be targeted. Deep learning is an advanced technique developed to act like that of the human neurological analysis on several problems. Implementation of deep learning algorithm to the cloud security module identifies the movement of malware and spywares in the cloud storage. Similarly the cryptography is an old technique structured to hide the information with a cover data or cover image. It allows the hacking algorithm to extract only the useless data. This paper reviews the recent advancements in the cloud security with blockchain, deep learning and cryptographic models.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131197149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-10DOI: 10.36548/jtcsst.2021.4.005
S. Kavitha, J. Manikandan
Acoustic signal classification issues are addressed in this work using spectral examination, channel extracting the features from the input and machine learning algorithm. This brief article examines the effect of various settings on feature extraction. This feature-level channel combination's accuracy increase is then observed. To categorise things, pattern recognition utilises a variety of classification schemes. "Pattern" refers to the measures that must be categorised with accurate feature extracted. Images and audio signals are among the most common kinds of measurements. The proposed Support Vector Machine (SVM) is used for the necessity of an effective categorization of acoustic signals driven by the continual improvements in multimedia technology. This study uses two machine learning algorithms to enhance audio classification and categorization. The proposed SVM achieves superior performance than the other ML algorithm by spectral features.
{"title":"Improved Methodology of SVM to Classify Acoustic Signal by Spectral Centroid","authors":"S. Kavitha, J. Manikandan","doi":"10.36548/jtcsst.2021.4.005","DOIUrl":"https://doi.org/10.36548/jtcsst.2021.4.005","url":null,"abstract":"Acoustic signal classification issues are addressed in this work using spectral examination, channel extracting the features from the input and machine learning algorithm. This brief article examines the effect of various settings on feature extraction. This feature-level channel combination's accuracy increase is then observed. To categorise things, pattern recognition utilises a variety of classification schemes. \"Pattern\" refers to the measures that must be categorised with accurate feature extracted. Images and audio signals are among the most common kinds of measurements. The proposed Support Vector Machine (SVM) is used for the necessity of an effective categorization of acoustic signals driven by the continual improvements in multimedia technology. This study uses two machine learning algorithms to enhance audio classification and categorization. The proposed SVM achieves superior performance than the other ML algorithm by spectral features.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121842148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-09DOI: 10.36548/jtcsst.2021.4.003
S. Smys, Jennifer S. Raj
Medical IoT systems have recently become one of the most sophisticated medical technologies in well-developed countries. The remote monitoring of medical services may benefit greatly from this technology. According to a new study, security measures and training are critical in protecting IoMT systems from cyber-attacks. In this paper, the primary security and privacy challenges with IoMT are examined using current security solutions. Non-cryptographic and cryptographic approaches are used for a variety of attacks. It's therefore possible to compare the computational complexity of the various solutions and the resources they demand. Besides, the discussion of attack versions with causes for possible solutions, the dangerous scenarios of various attacks are also provided here. IoMT security methods, particularly in the rapidly expanding field of digital healthcare, show a trade-off between security level and system performance. There is a final section that talks about the acceptable security solutions, such as various attacks through common solution methods and protocols.
{"title":"Future Challenges of the Internet of Things in the Health Care Domain - An Overview","authors":"S. Smys, Jennifer S. Raj","doi":"10.36548/jtcsst.2021.4.003","DOIUrl":"https://doi.org/10.36548/jtcsst.2021.4.003","url":null,"abstract":"Medical IoT systems have recently become one of the most sophisticated medical technologies in well-developed countries. The remote monitoring of medical services may benefit greatly from this technology. According to a new study, security measures and training are critical in protecting IoMT systems from cyber-attacks. In this paper, the primary security and privacy challenges with IoMT are examined using current security solutions. Non-cryptographic and cryptographic approaches are used for a variety of attacks. It's therefore possible to compare the computational complexity of the various solutions and the resources they demand. Besides, the discussion of attack versions with causes for possible solutions, the dangerous scenarios of various attacks are also provided here. IoMT security methods, particularly in the rapidly expanding field of digital healthcare, show a trade-off between security level and system performance. There is a final section that talks about the acceptable security solutions, such as various attacks through common solution methods and protocols.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133326774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-31DOI: 10.36548/jtcsst.2021.4.002
S. Sunil Kumar Aithal, Krishna Prasad Roa, R. P. Puneeth
Nowadays, internet has been well known as an information source where the information might be real or fake. Fake news over the web exist since several years. The main challenge is to detect the truthfulness of the news. The motive behind writing and publishing the fake news is to mislead the people. It causes damage to an agency, entity or person. This paper aims to detect fake news using semantic search.
{"title":"Fake News Detection using Data Mining Techniques","authors":"S. Sunil Kumar Aithal, Krishna Prasad Roa, R. P. Puneeth","doi":"10.36548/jtcsst.2021.4.002","DOIUrl":"https://doi.org/10.36548/jtcsst.2021.4.002","url":null,"abstract":"Nowadays, internet has been well known as an information source where the information might be real or fake. Fake news over the web exist since several years. The main challenge is to detect the truthfulness of the news. The motive behind writing and publishing the fake news is to mislead the people. It causes damage to an agency, entity or person. This paper aims to detect fake news using semantic search.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-28DOI: 10.36548/jtcsst.2021.4.001
A. Sathesh, Y. B. Hamdan
Recently, in computer vision and video surveillance applications, moving object recognition and tracking have become more popular and are hard research issues. When an item is left unattended in a video surveillance system for an extended period of time, it is considered abandoned. Detecting abandoned or removed things from complex surveillance recordings is challenging owing to various variables, including occlusion, rapid illumination changes, and so forth. Background subtraction used in conjunction with object tracking are often used in an automated abandoned item identification system, to check for certain pre-set patterns of activity that occur when an item is abandoned. An upgraded form of image processing is used in the preprocessing stage to remove foreground items. In subsequent frames with extended duration periods, static items are recognized by utilizing the contour characteristics of foreground objects. The edge-based object identification approach is used to classify the identified static items into human and nonhuman things. An alert is activated at a specific distance from the item, depending on the analysis of the stationary object. There is evidence that the suggested system has a fast reaction time and is useful for monitoring in real time. The aim of this study is to discover abandoned items in public settings in a timely manner.
{"title":"Speedy Detection Module for Abandoned Belongings in Airport Using Improved Image Processing Technique","authors":"A. Sathesh, Y. B. Hamdan","doi":"10.36548/jtcsst.2021.4.001","DOIUrl":"https://doi.org/10.36548/jtcsst.2021.4.001","url":null,"abstract":"Recently, in computer vision and video surveillance applications, moving object recognition and tracking have become more popular and are hard research issues. When an item is left unattended in a video surveillance system for an extended period of time, it is considered abandoned. Detecting abandoned or removed things from complex surveillance recordings is challenging owing to various variables, including occlusion, rapid illumination changes, and so forth. Background subtraction used in conjunction with object tracking are often used in an automated abandoned item identification system, to check for certain pre-set patterns of activity that occur when an item is abandoned. An upgraded form of image processing is used in the preprocessing stage to remove foreground items. In subsequent frames with extended duration periods, static items are recognized by utilizing the contour characteristics of foreground objects. The edge-based object identification approach is used to classify the identified static items into human and nonhuman things. An alert is activated at a specific distance from the item, depending on the analysis of the stationary object. There is evidence that the suggested system has a fast reaction time and is useful for monitoring in real time. The aim of this study is to discover abandoned items in public settings in a timely manner.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129080630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-15DOI: 10.36548/jtcsst.2022.2.004
Jayanthi Muthuswamy, Sabitabrata Bhattacharya, Haswitha P Sai, M. Deepthi, Nikitha Nagaraj, Priya Das P
The days of needing keyboards to avail a service are over. Users today use chatbots or voice assistants to interact with systems. Chatbots provide intelligent and adapted answers. The goal of a chatbot is to establish a productive conversation between humans and machines. For each user query that is considered input, the chatbot responds with an answer. From helping doctors manage their schedules to answering simple questions from the public, chatbots have proven to be very useful in healthcare. The global pandemic caused by the coronavirus has changed everyone's life and has affected it differently. People must be kept informed on various aspects. Purpose of this article is to discuss the implementation and model of a telegram-based chatbot system, which helps people understand the facts, precautions, preventive measures, and various other aspects related to the coronavirus. The bot also focuses on a person's mood and provides mental health support.
{"title":"IoT Based Covid Chatbot using Telegram","authors":"Jayanthi Muthuswamy, Sabitabrata Bhattacharya, Haswitha P Sai, M. Deepthi, Nikitha Nagaraj, Priya Das P","doi":"10.36548/jtcsst.2022.2.004","DOIUrl":"https://doi.org/10.36548/jtcsst.2022.2.004","url":null,"abstract":"The days of needing keyboards to avail a service are over. Users today use chatbots or voice assistants to interact with systems. Chatbots provide intelligent and adapted answers. The goal of a chatbot is to establish a productive conversation between humans and machines. For each user query that is considered input, the chatbot responds with an answer. From helping doctors manage their schedules to answering simple questions from the public, chatbots have proven to be very useful in healthcare. The global pandemic caused by the coronavirus has changed everyone's life and has affected it differently. People must be kept informed on various aspects. Purpose of this article is to discuss the implementation and model of a telegram-based chatbot system, which helps people understand the facts, precautions, preventive measures, and various other aspects related to the coronavirus. The bot also focuses on a person's mood and provides mental health support.","PeriodicalId":107574,"journal":{"name":"Journal of Trends in Computer Science and Smart Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128218821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}