Pub Date : 2023-02-02DOI: 10.1109/ICAIS56108.2023.10073849
Siva Prasad Reddy K.V, Archana K.S
Melanoma is considered as a most lethal form of cancer. Design and development of computer-aided intelligent algorithms for early detection of skin cancer is the emerging research area. Despite many conventional mechanisms, a new type of cancer caused by unrepaired Deoxyribonucleic acid (DNA) within the skin cells. Due to its nature of rapid genetic mutations on the skin, it widely affects other body parts if not treated at early stages of intelligent computing evidenced the development of automated medical diagnosis and recommendation systems. It is possible to identify between melanoma and other classification of skin cancer based on the symmetry, color, size, form, and other characteristics of lesions. Numerous efforts are made by many researchers to develop various deep learning and machine learning inspired classification and segmentation algorithms to analyses skin lesion images. In existing the algorithm used for this research was naïve bayes, support vector machine etc. Here, after several methods such as data pre-processing, image segmentation, feature extraction and the feature extraction and the proposed algorithm of adaboost method, which is used to tune the algorithm to predict the skin infection. Finally, the proposed model has achieved 92.5% accuracy when compared with existing work.
{"title":"Basal Cell Carcinoma Prediction in Pigmented Skin Infection using Intelligent Techniques","authors":"Siva Prasad Reddy K.V, Archana K.S","doi":"10.1109/ICAIS56108.2023.10073849","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073849","url":null,"abstract":"Melanoma is considered as a most lethal form of cancer. Design and development of computer-aided intelligent algorithms for early detection of skin cancer is the emerging research area. Despite many conventional mechanisms, a new type of cancer caused by unrepaired Deoxyribonucleic acid (DNA) within the skin cells. Due to its nature of rapid genetic mutations on the skin, it widely affects other body parts if not treated at early stages of intelligent computing evidenced the development of automated medical diagnosis and recommendation systems. It is possible to identify between melanoma and other classification of skin cancer based on the symmetry, color, size, form, and other characteristics of lesions. Numerous efforts are made by many researchers to develop various deep learning and machine learning inspired classification and segmentation algorithms to analyses skin lesion images. In existing the algorithm used for this research was naïve bayes, support vector machine etc. Here, after several methods such as data pre-processing, image segmentation, feature extraction and the feature extraction and the proposed algorithm of adaboost method, which is used to tune the algorithm to predict the skin infection. Finally, the proposed model has achieved 92.5% accuracy when compared with existing work.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130338225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-02DOI: 10.1109/ICAIS56108.2023.10073714
D. Sabapathi, Yogesh Shivaji Pawar, Sumagna Patnaik, E. Sivanantham, D. K. Prabhu, N. Prakash
Load forecasting plays a vital role in generation and distribution sectors in the power system. This helps to obtain optimum load scheduling which helps to predict future consumption to increase reliability in the system. The demand side management helps to optimize the consumption of energy based upon the priority of the consumers. The load forecasting helps to predict the usage of power through the priority scheduling of the loads which helps to minimize and maximize the operating cost. The optimization technique plays a versatile role in the load scheduling based on demand side management in the industrial sectors. The combination of advanced technologies with communication infrastructure makes the system more reliable and smarter. The demand side management is achieved through shifting the loads from peak hours to non-peak hours. Thus, to enhance the automatic scheduling of loads in the industrial sector is achieved by the neuro-fuzzy controller and deep learning techniques.
{"title":"Management in Industrial Sectors using Neuro-Fuzzy Controller and Deep Learning","authors":"D. Sabapathi, Yogesh Shivaji Pawar, Sumagna Patnaik, E. Sivanantham, D. K. Prabhu, N. Prakash","doi":"10.1109/ICAIS56108.2023.10073714","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073714","url":null,"abstract":"Load forecasting plays a vital role in generation and distribution sectors in the power system. This helps to obtain optimum load scheduling which helps to predict future consumption to increase reliability in the system. The demand side management helps to optimize the consumption of energy based upon the priority of the consumers. The load forecasting helps to predict the usage of power through the priority scheduling of the loads which helps to minimize and maximize the operating cost. The optimization technique plays a versatile role in the load scheduling based on demand side management in the industrial sectors. The combination of advanced technologies with communication infrastructure makes the system more reliable and smarter. The demand side management is achieved through shifting the loads from peak hours to non-peak hours. Thus, to enhance the automatic scheduling of loads in the industrial sector is achieved by the neuro-fuzzy controller and deep learning techniques.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"1995 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-02DOI: 10.1109/ICAIS56108.2023.10073660
Jieqi Li, Shaoqiang Guo, Wei Li
Monitoring the combined structural stability under different scenario is an essential task for the security, hence, this paper designs the novel nighttime monitoring system for combined structural stability based on the infrared image recognition. Firstly, this study discusses the infrared image recognition algorithm considering the different features and methods. Then, the combined structural feature is discussed to further assist the processing of images. Finally, the nighttime monitoring system is implemented with the designed image processing algorithm. The proposed model utilizes the SURF algorithm to select the features. Based on the integral image, the SURF algorithm uses the Hessian operator to detect and obtain feature points. Through the testing, the performance before and after the processing for the original image is presented. And through the analysis on ratio of the number of correctly tested samples, the model is proven to be effective.
{"title":"A Nighttime Monitoring System for Combined Structural Stability based on Infrared Image Recognition","authors":"Jieqi Li, Shaoqiang Guo, Wei Li","doi":"10.1109/ICAIS56108.2023.10073660","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073660","url":null,"abstract":"Monitoring the combined structural stability under different scenario is an essential task for the security, hence, this paper designs the novel nighttime monitoring system for combined structural stability based on the infrared image recognition. Firstly, this study discusses the infrared image recognition algorithm considering the different features and methods. Then, the combined structural feature is discussed to further assist the processing of images. Finally, the nighttime monitoring system is implemented with the designed image processing algorithm. The proposed model utilizes the SURF algorithm to select the features. Based on the integral image, the SURF algorithm uses the Hessian operator to detect and obtain feature points. Through the testing, the performance before and after the processing for the original image is presented. And through the analysis on ratio of the number of correctly tested samples, the model is proven to be effective.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115784508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-02DOI: 10.1109/ICAIS56108.2023.10073742
Madhwaraj Kango Gopal, A. V, Adarsh Ishwar Hegde, Adarsh Jaiswal
IoT (Internet of Things) is a concept that has been used extensively due to its acceptance and benefits if offers while used across several domains. Good fresh air with the right mix of particulates is what is needed today to ward off respiratory disorders. An important concern that needs to be addressed is how to provide this fresh air in today’s living environment. In this work, an IoT-based approach has been used to effectively increase the efficiency and overall air quality within indoor spaces. Several parameters like using temperature sensor to sense temperature, humidity sensor to sense humidity, Smoke sensor to collect data from the different gases, and many more other sensors are used to collect data from dust and air particulates. Fuzzy logic algorithms are used to check whether the levels of the gases will cause discomfort or breathing difficulties in the people who are currently within the confines of the area. An automated air ventilation and filtration system is used to either increase or decrease the airflow of the system to mitigate the air quality degradation and bring the system back to an equilibrium state therefore maintaining fresh air circulation.
{"title":"An IoT-based Approach to Air Circulation within a Specific Room Environment","authors":"Madhwaraj Kango Gopal, A. V, Adarsh Ishwar Hegde, Adarsh Jaiswal","doi":"10.1109/ICAIS56108.2023.10073742","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073742","url":null,"abstract":"IoT (Internet of Things) is a concept that has been used extensively due to its acceptance and benefits if offers while used across several domains. Good fresh air with the right mix of particulates is what is needed today to ward off respiratory disorders. An important concern that needs to be addressed is how to provide this fresh air in today’s living environment. In this work, an IoT-based approach has been used to effectively increase the efficiency and overall air quality within indoor spaces. Several parameters like using temperature sensor to sense temperature, humidity sensor to sense humidity, Smoke sensor to collect data from the different gases, and many more other sensors are used to collect data from dust and air particulates. Fuzzy logic algorithms are used to check whether the levels of the gases will cause discomfort or breathing difficulties in the people who are currently within the confines of the area. An automated air ventilation and filtration system is used to either increase or decrease the airflow of the system to mitigate the air quality degradation and bring the system back to an equilibrium state therefore maintaining fresh air circulation.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125077905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-02DOI: 10.1109/ICAIS56108.2023.10073692
K. Ganesh, K. Parimala, P. Raveesha, A. Samal, M. Ln, Ashish Verma
A lot has happened in the healthcare industry in recent years thanks to the Internet of Things (IoT). The smart gadgets attached to the body make it easy to measure medical parameters, resulting in a huge amount of individualized medical data for each patient. A wide range of security concerns can arise from this data. Things-as-internet is a new technology that has exploded in popularity in the last few of years. Revolutionary technologies like smart homes, grids, and cities are transforming our daily lives thanks to the Internet of Things (IoT). Internet of Things (IoT) principles are being employed to connect medical resources and provide patients with intelligent, dependable, and effective healthcare. The Internet of Things (IoT) can be used to improve the patient's lifestyle by monitoring their health in the context of active and supported living. For the purpose of introducing smart healthcare, this study first lists the major technologies that support it and introduce its current status in numerous vital fields. One of the most important contributions of this study is the discussion of security measures that can be used for both current and future IoT healthcare systems. Current IoT implementations have been thoroughly analysed and investigated in order to provide clear, exact solutions to the problems now faced by IoT implementations.
{"title":"Internet of Smart Things for Smart Healthcare and Safety Management","authors":"K. Ganesh, K. Parimala, P. Raveesha, A. Samal, M. Ln, Ashish Verma","doi":"10.1109/ICAIS56108.2023.10073692","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073692","url":null,"abstract":"A lot has happened in the healthcare industry in recent years thanks to the Internet of Things (IoT). The smart gadgets attached to the body make it easy to measure medical parameters, resulting in a huge amount of individualized medical data for each patient. A wide range of security concerns can arise from this data. Things-as-internet is a new technology that has exploded in popularity in the last few of years. Revolutionary technologies like smart homes, grids, and cities are transforming our daily lives thanks to the Internet of Things (IoT). Internet of Things (IoT) principles are being employed to connect medical resources and provide patients with intelligent, dependable, and effective healthcare. The Internet of Things (IoT) can be used to improve the patient's lifestyle by monitoring their health in the context of active and supported living. For the purpose of introducing smart healthcare, this study first lists the major technologies that support it and introduce its current status in numerous vital fields. One of the most important contributions of this study is the discussion of security measures that can be used for both current and future IoT healthcare systems. Current IoT implementations have been thoroughly analysed and investigated in order to provide clear, exact solutions to the problems now faced by IoT implementations.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133418241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-02DOI: 10.1109/ICAIS56108.2023.10073890
Jenyfal Sampson, R. Nandakishore Reddy, M. Venkata Janardhan Reddy, Myla Chandra Narayana, R. Varun Kumar
The purpose of this study is to predict the flood at the dams and alerting the authorities to make them the people who are living their lives in remote areas i.e., near to the dam to the safer place, so that to reduce the mortality rate due to unprecedented flood. This study predicts the flood by using sensor-based networking system. Here, two ultrasonic sensors are connected to determine the level of water; waterflow sensor is used to know the speed of water; rainfall sensor is used to determine the rainfall. After measuring all the factors, the data is processed to the NodeMCU, which will act as a transmitter and it will transfer the data through the wireless communication to the another NodeMCU, which was situated at the office present at the dam and it will act as a receiver. After analyzing all the values, if the values exceed the limit, an alert will be sent to the authorities and then automatically the dam gates will get open.
{"title":"IoT based Early Flood Detection, Destruction Avoidance and Automated Dam Gate Control System","authors":"Jenyfal Sampson, R. Nandakishore Reddy, M. Venkata Janardhan Reddy, Myla Chandra Narayana, R. Varun Kumar","doi":"10.1109/ICAIS56108.2023.10073890","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073890","url":null,"abstract":"The purpose of this study is to predict the flood at the dams and alerting the authorities to make them the people who are living their lives in remote areas i.e., near to the dam to the safer place, so that to reduce the mortality rate due to unprecedented flood. This study predicts the flood by using sensor-based networking system. Here, two ultrasonic sensors are connected to determine the level of water; waterflow sensor is used to know the speed of water; rainfall sensor is used to determine the rainfall. After measuring all the factors, the data is processed to the NodeMCU, which will act as a transmitter and it will transfer the data through the wireless communication to the another NodeMCU, which was situated at the office present at the dam and it will act as a receiver. After analyzing all the values, if the values exceed the limit, an alert will be sent to the authorities and then automatically the dam gates will get open.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114808342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-02DOI: 10.1109/ICAIS56108.2023.10073860
M. Karthik, R. Vishnu, M. Vigneshwar, M. Logaeshwar
One of the most important concerns across the globe is energy crisis. The potential solution for this problem is renewable energy. In recent years, solar panels have been employed more frequently to transform solar energy into electrical energy. It is reasonably priced and almost completely safe for the environment. The electromagnetic radiation that is used to produce electricity is released by it. The major goal is to develop a workable autonomous solar tracking system that moves the solar panel so that it remains always perpendicular to the sun. In this system, the sensor will be a photoresistor. The horizontal and the vertical axes on the dual axis solar panel are rotated, so that the efficiency of the device can be increased. Hence, the dual axis provides precise control of planet elevation relative to the sun. This will provide better efficiency of the panel.
{"title":"Arduino based Dual Axis Smart Solar Tracking System","authors":"M. Karthik, R. Vishnu, M. Vigneshwar, M. Logaeshwar","doi":"10.1109/ICAIS56108.2023.10073860","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073860","url":null,"abstract":"One of the most important concerns across the globe is energy crisis. The potential solution for this problem is renewable energy. In recent years, solar panels have been employed more frequently to transform solar energy into electrical energy. It is reasonably priced and almost completely safe for the environment. The electromagnetic radiation that is used to produce electricity is released by it. The major goal is to develop a workable autonomous solar tracking system that moves the solar panel so that it remains always perpendicular to the sun. In this system, the sensor will be a photoresistor. The horizontal and the vertical axes on the dual axis solar panel are rotated, so that the efficiency of the device can be increased. Hence, the dual axis provides precise control of planet elevation relative to the sun. This will provide better efficiency of the panel.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115023362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-02DOI: 10.1109/ICAIS56108.2023.10073689
Dhruv Kolhatkar, Devika Verma
Over the past few years, research interest in the sub-domain of question answering has tremendously increased. Yet, most of the work on QA and more generally, on natural language processing has been predominantly limited to the English language. In contrast, with each passing year, the number of people with access to the internet is exponentially increasing, especially those residing in South Asian countries whose primary language is not English. With this in mind, the survey’s aim is to recognize, review and analyze the various question-answering datasets that exist for resource-scare Indic languages such as Hindi, Urdu, Tamil, and Marathi. It also intends to shed light on the state-of-the-art of Indic question-answering itself, in terms of methods used, best-performing models, and evaluation metrics. The review also includes multilingual benchmarks which have been recently published.
{"title":"Indic Language Question Answering: A Survey","authors":"Dhruv Kolhatkar, Devika Verma","doi":"10.1109/ICAIS56108.2023.10073689","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073689","url":null,"abstract":"Over the past few years, research interest in the sub-domain of question answering has tremendously increased. Yet, most of the work on QA and more generally, on natural language processing has been predominantly limited to the English language. In contrast, with each passing year, the number of people with access to the internet is exponentially increasing, especially those residing in South Asian countries whose primary language is not English. With this in mind, the survey’s aim is to recognize, review and analyze the various question-answering datasets that exist for resource-scare Indic languages such as Hindi, Urdu, Tamil, and Marathi. It also intends to shed light on the state-of-the-art of Indic question-answering itself, in terms of methods used, best-performing models, and evaluation metrics. The review also includes multilingual benchmarks which have been recently published.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121673844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-02DOI: 10.1109/ICAIS56108.2023.10073869
Y. Vijaya Lakshmi, K. Naveena, M. Ramya, N. Pravallika, T. Sindhu, V. Namitha
Medical photographs are considered sensitive and crucial data in medical informatics systems. To communicate medical photos via an insecure network, a trustworthy encryption solution must be created. Encryption is the most effective way for ensuring image secrecy since it eliminates the risk of data loss. The two types of encryptions are symmetric encryption, which uses a single key for both encryption and decryption and gives just confidentiality, making it less safe, and asymmetric encryption, which uses two keys for encryption and decryption and provides confidentiality, non-repudiation, and authentication, making it more secure. It is now simpler than ever for complete strangers to access the most sensitive information recorded on your computer due to hacking activities and privacy intrusions. As a result, asymmetric encryption outperforms symmetric encryption. Despite the fact that there are several security alternatives accessible, such as free anti-malware software for home users and cloud anti-virus for organizations, these attempts to secure data Some large corporations and government agencies already use encryption software to secure data, but it is also available and becoming more readily available to the general public. The RSA algorithm is an asymmetric encryption technique that safeguards the picture before transferring it. It is one of the most extensively used encryption tools.
{"title":"Medical Image Encryption using Enhanced Rivest Shamir Adleman Algorithm","authors":"Y. Vijaya Lakshmi, K. Naveena, M. Ramya, N. Pravallika, T. Sindhu, V. Namitha","doi":"10.1109/ICAIS56108.2023.10073869","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073869","url":null,"abstract":"Medical photographs are considered sensitive and crucial data in medical informatics systems. To communicate medical photos via an insecure network, a trustworthy encryption solution must be created. Encryption is the most effective way for ensuring image secrecy since it eliminates the risk of data loss. The two types of encryptions are symmetric encryption, which uses a single key for both encryption and decryption and gives just confidentiality, making it less safe, and asymmetric encryption, which uses two keys for encryption and decryption and provides confidentiality, non-repudiation, and authentication, making it more secure. It is now simpler than ever for complete strangers to access the most sensitive information recorded on your computer due to hacking activities and privacy intrusions. As a result, asymmetric encryption outperforms symmetric encryption. Despite the fact that there are several security alternatives accessible, such as free anti-malware software for home users and cloud anti-virus for organizations, these attempts to secure data Some large corporations and government agencies already use encryption software to secure data, but it is also available and becoming more readily available to the general public. The RSA algorithm is an asymmetric encryption technique that safeguards the picture before transferring it. It is one of the most extensively used encryption tools.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123859719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-02DOI: 10.1109/ICAIS56108.2023.10073898
Vazeer Ali Mohammed, Mehmood Ali Mohammed, Murtuza Ali Mohammed, J. Logeshwaran, Nasmin Jiwani
At present, various electronic devices are used to monitor human heart rates. However, its functions are to avoid predicting the problems caused by heart rate variability in advance and analyzing its implications. It makes it difficult to diagnose problems caused by heart rate variability. A human should have an average heart rate of 72. At the same time, the newborn's heart should beat between 120 and 160 beats per minute. A baby born with autism spectrum disorder may have a lower-than-average heart rate. Complete blockage of the heart at birth is rare. Abnormal heart rate leads to heart block. So, there is a high chance of the child's death due to permanent heart blockage at any time. Most heart diseases in children with Autism Spectrum Disorder (ASD) are present at birth. A significant congenital disability is a hole in the heart. Many people do not realize that having holes in the heart is a common occurrence. Before the baby is born, tiny holes form in the muscular wall that divides the heart into the right and left halves. This paper proposed Machine Learning-Based Evaluation to identify the Heart Rate Variability Response in Children with Autism Spectrum Disorder with Autism Spectrum Disorder. The reasons for this are yet to be identified. However, 70 per cent of perforations resolve spontaneously before or after birth. Exceptionally, Children with Autism Spectrum Disorder with perforations that do not close properly may require surgery or a perforator brace, depending on the location and size of the perforation.
{"title":"Machine Learning-based Evaluation of Heart Rate Variability Response in Children with Autism Spectrum Disorder","authors":"Vazeer Ali Mohammed, Mehmood Ali Mohammed, Murtuza Ali Mohammed, J. Logeshwaran, Nasmin Jiwani","doi":"10.1109/ICAIS56108.2023.10073898","DOIUrl":"https://doi.org/10.1109/ICAIS56108.2023.10073898","url":null,"abstract":"At present, various electronic devices are used to monitor human heart rates. However, its functions are to avoid predicting the problems caused by heart rate variability in advance and analyzing its implications. It makes it difficult to diagnose problems caused by heart rate variability. A human should have an average heart rate of 72. At the same time, the newborn's heart should beat between 120 and 160 beats per minute. A baby born with autism spectrum disorder may have a lower-than-average heart rate. Complete blockage of the heart at birth is rare. Abnormal heart rate leads to heart block. So, there is a high chance of the child's death due to permanent heart blockage at any time. Most heart diseases in children with Autism Spectrum Disorder (ASD) are present at birth. A significant congenital disability is a hole in the heart. Many people do not realize that having holes in the heart is a common occurrence. Before the baby is born, tiny holes form in the muscular wall that divides the heart into the right and left halves. This paper proposed Machine Learning-Based Evaluation to identify the Heart Rate Variability Response in Children with Autism Spectrum Disorder with Autism Spectrum Disorder. The reasons for this are yet to be identified. However, 70 per cent of perforations resolve spontaneously before or after birth. Exceptionally, Children with Autism Spectrum Disorder with perforations that do not close properly may require surgery or a perforator brace, depending on the location and size of the perforation.","PeriodicalId":164345,"journal":{"name":"2023 Third International Conference on Artificial Intelligence and Smart Energy (ICAIS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124120428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}