Pub Date : 2023-02-22DOI: 10.1109/iciptm57143.2023.10118303
{"title":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM 2023)","authors":"","doi":"10.1109/iciptm57143.2023.10118303","DOIUrl":"https://doi.org/10.1109/iciptm57143.2023.10118303","url":null,"abstract":"","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133416488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-22DOI: 10.1109/ICIPTM57143.2023.10117963
Marouf Muzaffar War, Dalwinder Singh
Vision-based Alarming rates of heart disease affect both sexes. Early warning of heart disease may be obtained by monitoring a variety of risk factors. This new technology is having a profound effect on healthcare systems. As a result of the Internet of Things, we can now remotely monitor patients, gather data, and analyze it to provide superior treatment. However, there is a critical need to provide unique and state-of-the-art secure algorithms for speedy event processing and effective event identification. In this piece, we present a tetrolet ELGamal algorithm (TEA)-based machine learning based logistic Bayesian decision tree (LBDT) for predicting cardiac issues based on existing data saved in the cloud. In addition to providing a safe place to keep sensitive patient data, the cloud may be used as a reliable data source for educational purposes. Comparisons are made between the suggested (LBDT TEA) and other algorithms in terms of encrypting and decrypting times, as well as accuracy, precision, recall, and F-score.
{"title":"Review On Enhancing Healthcare Services for Heart Disease Patients using Machine Learning Approaches in Cloud Environment","authors":"Marouf Muzaffar War, Dalwinder Singh","doi":"10.1109/ICIPTM57143.2023.10117963","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10117963","url":null,"abstract":"Vision-based Alarming rates of heart disease affect both sexes. Early warning of heart disease may be obtained by monitoring a variety of risk factors. This new technology is having a profound effect on healthcare systems. As a result of the Internet of Things, we can now remotely monitor patients, gather data, and analyze it to provide superior treatment. However, there is a critical need to provide unique and state-of-the-art secure algorithms for speedy event processing and effective event identification. In this piece, we present a tetrolet ELGamal algorithm (TEA)-based machine learning based logistic Bayesian decision tree (LBDT) for predicting cardiac issues based on existing data saved in the cloud. In addition to providing a safe place to keep sensitive patient data, the cloud may be used as a reliable data source for educational purposes. Comparisons are made between the suggested (LBDT TEA) and other algorithms in terms of encrypting and decrypting times, as well as accuracy, precision, recall, and F-score.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131301526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-22DOI: 10.1109/ICIPTM57143.2023.10117831
J. J. Daniel Raj, C.N Sangeetha, Sarthak Ghorai, Subhajit Das, Manish, Shariq Ahmed
There are many animal attacks on human is being reported in the recent days particularly in the forest area which claims innocent lives. In order to reduce such incidents this work is aimed to identify animals and alert vehicles to slowdown accident rates using IOT detection system. If the detection is triggered, the alert system will give signals to driver. Hence, the system will save the animal and reduce number of accidents in the jungle side highways. In this work Raspberry Pi 3 Model B is used for detecting the animals and alerting the vehicles. The camera is configured for use in Raspberry Pi to take shoot images and movement of animals. It also employs IOT based image detection system using display or sound alert system. We try to slowdown the vehicle to avoid accidents. We have used YOLO algorithm which helps us to process the system which takes 45 frames per sec. This proposed system process the image to predict the object at once.
{"title":"Wild Animals Intrusion Detection for Safe Commuting in Forest Corridors using AI Techniques","authors":"J. J. Daniel Raj, C.N Sangeetha, Sarthak Ghorai, Subhajit Das, Manish, Shariq Ahmed","doi":"10.1109/ICIPTM57143.2023.10117831","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10117831","url":null,"abstract":"There are many animal attacks on human is being reported in the recent days particularly in the forest area which claims innocent lives. In order to reduce such incidents this work is aimed to identify animals and alert vehicles to slowdown accident rates using IOT detection system. If the detection is triggered, the alert system will give signals to driver. Hence, the system will save the animal and reduce number of accidents in the jungle side highways. In this work Raspberry Pi 3 Model B is used for detecting the animals and alerting the vehicles. The camera is configured for use in Raspberry Pi to take shoot images and movement of animals. It also employs IOT based image detection system using display or sound alert system. We try to slowdown the vehicle to avoid accidents. We have used YOLO algorithm which helps us to process the system which takes 45 frames per sec. This proposed system process the image to predict the object at once.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115932247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-22DOI: 10.1109/ICIPTM57143.2023.10118160
K. M. Sankar, B. Booba, C. Rangaswamy, P. V. Pramila, S. Kar, Ashok Kumar, M. Sudhakar
This article provides IoT information on a great option for tracking local temperature variables and enabling the information accessible from any part of the planet. The dynamic changes in the weather are to blame for the severe flooding. Using the NODEMCU ESP8266, it accomplishes the creation of a flood observing arrangement for loading and recovering data from the arrangement. Ultrasonic sensors and LEDs are used to warn the authorities to the presence of heavy water. A crucial component of plant life, soil moisture will directly impact crop growth and output. A key component of the vegetation that directly affects the development and production of the harvest is soil moisture. It uses a microcontroller and sensor to carry out the advancement of soil dampness checking. The initial tremor of a large earthquake is picked up by an earthquake warning system employing a sensor. Because there are more businesses and vehicles on the road today, the air quality is poor, which has an impact on people. The importance of using IOT to evaluate the value of the air and the amount of pollutants in the environment cannot be overstated because the field has experienced a major development. It creates a system that uses the MQ135 sensor, which will be visible on the Cayenne platform, to measure the amount of harmful airborne pollutants such methane, alcohol, benzene, and CO2. Data is automatically stored in private channels by thing talk. The data obtained from the embedded scheme could be reachable over an internet from wherever in the sphere.
{"title":"IoT based Weather, Soil, Earthquake, Air pollution Monitoring System","authors":"K. M. Sankar, B. Booba, C. Rangaswamy, P. V. Pramila, S. Kar, Ashok Kumar, M. Sudhakar","doi":"10.1109/ICIPTM57143.2023.10118160","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10118160","url":null,"abstract":"This article provides IoT information on a great option for tracking local temperature variables and enabling the information accessible from any part of the planet. The dynamic changes in the weather are to blame for the severe flooding. Using the NODEMCU ESP8266, it accomplishes the creation of a flood observing arrangement for loading and recovering data from the arrangement. Ultrasonic sensors and LEDs are used to warn the authorities to the presence of heavy water. A crucial component of plant life, soil moisture will directly impact crop growth and output. A key component of the vegetation that directly affects the development and production of the harvest is soil moisture. It uses a microcontroller and sensor to carry out the advancement of soil dampness checking. The initial tremor of a large earthquake is picked up by an earthquake warning system employing a sensor. Because there are more businesses and vehicles on the road today, the air quality is poor, which has an impact on people. The importance of using IOT to evaluate the value of the air and the amount of pollutants in the environment cannot be overstated because the field has experienced a major development. It creates a system that uses the MQ135 sensor, which will be visible on the Cayenne platform, to measure the amount of harmful airborne pollutants such methane, alcohol, benzene, and CO2. Data is automatically stored in private channels by thing talk. The data obtained from the embedded scheme could be reachable over an internet from wherever in the sphere.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114469512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-22DOI: 10.1109/ICIPTM57143.2023.10118064
B. Jayaram, T. Suguna, S. Fairooz, A. P, S. Vimal
Malicious hackers may compromise hundreds or millions of machines with little effort, allowing them to shut down networks, steal sensitive data, and compromise critical infrastructure. Data is stolen and used for malicious purposes by hackers who exploit security flaws in the network. And the sophisticated technology they use, like the bucks they do, are continually feeding them the information they needed, not just once. Moreover, even if Internet firewalls have improved, cybercrime has been on the rise. Then, we have a long way to go before we approach the limit, what with all the different kinds of cloud server devices that can connect to the internet nowadays. It's certain that in the future, little devices, no matter how helpful they are really in our everyday lives, will become the preferred tool of villains. In this research, we offer a novel security technique for protecting sensitive data on cloud servers. This intelligent cloud server was protected from any hacking with the aid of this algorithm. The system's output was measured against those of pre-existing algorithms. More than 96% of inputs are authenticated by the proposed technique, while password cracking operations are reduced by about 3%. The source code security management is improved to 99% and the updating issues for various devices entries is reduced 0.02%, and further the privacy breach is reduced up to 0.32%. Hence the proposed method was more secured from cyber security issues.
{"title":"Secure Data Reduplication System with Efficient and Reliable Multi-Key Management in Cloud Storage","authors":"B. Jayaram, T. Suguna, S. Fairooz, A. P, S. Vimal","doi":"10.1109/ICIPTM57143.2023.10118064","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10118064","url":null,"abstract":"Malicious hackers may compromise hundreds or millions of machines with little effort, allowing them to shut down networks, steal sensitive data, and compromise critical infrastructure. Data is stolen and used for malicious purposes by hackers who exploit security flaws in the network. And the sophisticated technology they use, like the bucks they do, are continually feeding them the information they needed, not just once. Moreover, even if Internet firewalls have improved, cybercrime has been on the rise. Then, we have a long way to go before we approach the limit, what with all the different kinds of cloud server devices that can connect to the internet nowadays. It's certain that in the future, little devices, no matter how helpful they are really in our everyday lives, will become the preferred tool of villains. In this research, we offer a novel security technique for protecting sensitive data on cloud servers. This intelligent cloud server was protected from any hacking with the aid of this algorithm. The system's output was measured against those of pre-existing algorithms. More than 96% of inputs are authenticated by the proposed technique, while password cracking operations are reduced by about 3%. The source code security management is improved to 99% and the updating issues for various devices entries is reduced 0.02%, and further the privacy breach is reduced up to 0.32%. Hence the proposed method was more secured from cyber security issues.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114862332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-22DOI: 10.1109/ICIPTM57143.2023.10118028
K. Manoj
Cloud computing technology is an excellent source for increasing data management capacity and providing a variety of services. Clients can access a variety of services via the internet using this technology. This Cloud technology provides several advantages to banks, including lower costs, more data processing capability, and better competence in financial services. Financial firms would use cloud services with greater efficiency and flexibility as needed. However, many firms are hesitating to employ this technology because of security concerns. Keeping data safe in the cloud is becoming more and more important. The paper aims to propose a solution to the aforementioned problem using blockchain and biometrics. Biometrics is a digitalized method for recognizing people based on physiological characteristics. Biometrics and cryptography might be used to make the cloud server extra secure. The cloud-based protected data is secured using bio-cryptography concealment. The method secures the protection and deciphering of data in the cloud by using biometrics as the primary component. We discuss how to make the biometric system safer by utilizing cloud computing, as well as how to improve its performance so that criminals cannot access your data. Biometric authentication is a viable solution for cloud services. We will explore how to construct a cryptographic technique within a blockchain to overcome these concerns. Blockchain technology will improve data security by utilizing cryptographic keys. The system also manages error recovery, which leads to the failing cloud instance being immediately identified and corrected.
{"title":"Secure Blockchain Banking Cloud with Error Recovery Processes","authors":"K. Manoj","doi":"10.1109/ICIPTM57143.2023.10118028","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10118028","url":null,"abstract":"Cloud computing technology is an excellent source for increasing data management capacity and providing a variety of services. Clients can access a variety of services via the internet using this technology. This Cloud technology provides several advantages to banks, including lower costs, more data processing capability, and better competence in financial services. Financial firms would use cloud services with greater efficiency and flexibility as needed. However, many firms are hesitating to employ this technology because of security concerns. Keeping data safe in the cloud is becoming more and more important. The paper aims to propose a solution to the aforementioned problem using blockchain and biometrics. Biometrics is a digitalized method for recognizing people based on physiological characteristics. Biometrics and cryptography might be used to make the cloud server extra secure. The cloud-based protected data is secured using bio-cryptography concealment. The method secures the protection and deciphering of data in the cloud by using biometrics as the primary component. We discuss how to make the biometric system safer by utilizing cloud computing, as well as how to improve its performance so that criminals cannot access your data. Biometric authentication is a viable solution for cloud services. We will explore how to construct a cryptographic technique within a blockchain to overcome these concerns. Blockchain technology will improve data security by utilizing cryptographic keys. The system also manages error recovery, which leads to the failing cloud instance being immediately identified and corrected.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116819806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-22DOI: 10.1109/ICIPTM57143.2023.10117713
Cuddapah Anitha, K. R, Chettiyar Vani Vivekanand, S. D. Lalitha, S. Boopathi, R. R
The Internet of Medical Things (IoMT) has been applied to provide health care facilities for elders and parents. Remote health care is essential for providing scarce resources and facilities to coronavirus patients. Ongoing IoMT communication is susceptible to potential security attacks. In this research, an artificial intelligence-driven security model of the IoMT is also proposed to simulate and analyses the results. Under the proposed plan, only authorized users will be able to access private and sensitive patient information, and unauthorized users will be unable to access a secure healthcare network. The various phases for implementing artificial intelligence (AI) techniques in the IoMT system have been discussed. AI-driven IoMT is implemented using decision trees, logistic regression, support vector machines (SVM), and k-nearest neighbours (KNN) techniques. The KNN learning models are recommended for IoMT applications due to their low consumption time with high accuracy and effective prediction.
{"title":"Artificial Intelligence driven security model for Internet of Medical Things (IoMT)","authors":"Cuddapah Anitha, K. R, Chettiyar Vani Vivekanand, S. D. Lalitha, S. Boopathi, R. R","doi":"10.1109/ICIPTM57143.2023.10117713","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10117713","url":null,"abstract":"The Internet of Medical Things (IoMT) has been applied to provide health care facilities for elders and parents. Remote health care is essential for providing scarce resources and facilities to coronavirus patients. Ongoing IoMT communication is susceptible to potential security attacks. In this research, an artificial intelligence-driven security model of the IoMT is also proposed to simulate and analyses the results. Under the proposed plan, only authorized users will be able to access private and sensitive patient information, and unauthorized users will be unable to access a secure healthcare network. The various phases for implementing artificial intelligence (AI) techniques in the IoMT system have been discussed. AI-driven IoMT is implemented using decision trees, logistic regression, support vector machines (SVM), and k-nearest neighbours (KNN) techniques. The KNN learning models are recommended for IoMT applications due to their low consumption time with high accuracy and effective prediction.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124622544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-22DOI: 10.1109/ICIPTM57143.2023.10118023
Mohitsinh Parmar, Hardik Rajgor, S. Khant
In current era people are suffering from many problems including common and rare diseases. The common diseases like hypertension and diabetes can be curable and controllable using proper medical guidance and diet but there is some rare disease which people do not aware about. Some of the rare diseases are Wilson's disease, Hemochromatosis and Ricket's disease. The causes of these disease are food deficiency or excessive consumption of minerals. Proper Food intake must be necessary to control these rare diseases. Specific nutrition must be required to control these diseases. In this research paper we have proposed an application which can be used by thepatient suffering from these rare diseases. It is developed using Android Studio platform. In the application user can enter the rare disease type and based on selected type a user is guided forfood to be intake by them. User can get the information regarding the hospitals which provides treatments for these raredisease.
{"title":"NutriFACT: An Android based Mobile Application for Intake of Food Nutrition during Rare Disease","authors":"Mohitsinh Parmar, Hardik Rajgor, S. Khant","doi":"10.1109/ICIPTM57143.2023.10118023","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10118023","url":null,"abstract":"In current era people are suffering from many problems including common and rare diseases. The common diseases like hypertension and diabetes can be curable and controllable using proper medical guidance and diet but there is some rare disease which people do not aware about. Some of the rare diseases are Wilson's disease, Hemochromatosis and Ricket's disease. The causes of these disease are food deficiency or excessive consumption of minerals. Proper Food intake must be necessary to control these rare diseases. Specific nutrition must be required to control these diseases. In this research paper we have proposed an application which can be used by thepatient suffering from these rare diseases. It is developed using Android Studio platform. In the application user can enter the rare disease type and based on selected type a user is guided forfood to be intake by them. User can get the information regarding the hospitals which provides treatments for these raredisease.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132029985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-22DOI: 10.1109/iciptm57143.2023.10117886
Pooja Jose, S. S, Meghana S, U. M. Arshad, Suraj Raju Jadhav, Santhosh Kummi
The current state of air pollution in India is a major worry. Many Indian cities are among the maximum polluted, according to a new global report. The two main causes of air pollution are the industrial and transportation sectors. Among these, the industrial and transportation sectors are each accountable for 27% and 51%, respectively, of the air pollution. Every year, two million Indians die before their time due to air pollution. Electric vehicles (EV) can aid in lowering GHG emissions, which in turn can aid in lowering air pollution. Numerous benefits, including a drop in pollution and lower costs for oil imports, are provided by electric vehicles. Despite numerous obstacles, India is moving toward building electric vehicles. In this paper, we express our concern over the rising global energy consumption, which motivates us to convert to renewable energy sources. We can conserve energy in many different ways across a range of industries. The conversion of stationary exercise bikes to electric bikes is our primary goal. As there is less pollution, low maintenance costs, and reduced noise, we employ an electrical motor (BLDC motor) in these electric bikes instead of a combustion engine. The rechargeable battery packs chemical energy is used by these bikes. This paper discusses the design and development of electric bikes from conserving energy by pedaling the stationary exercise.
{"title":"A Novel EV Charging Using Stationary Bike","authors":"Pooja Jose, S. S, Meghana S, U. M. Arshad, Suraj Raju Jadhav, Santhosh Kummi","doi":"10.1109/iciptm57143.2023.10117886","DOIUrl":"https://doi.org/10.1109/iciptm57143.2023.10117886","url":null,"abstract":"The current state of air pollution in India is a major worry. Many Indian cities are among the maximum polluted, according to a new global report. The two main causes of air pollution are the industrial and transportation sectors. Among these, the industrial and transportation sectors are each accountable for 27% and 51%, respectively, of the air pollution. Every year, two million Indians die before their time due to air pollution. Electric vehicles (EV) can aid in lowering GHG emissions, which in turn can aid in lowering air pollution. Numerous benefits, including a drop in pollution and lower costs for oil imports, are provided by electric vehicles. Despite numerous obstacles, India is moving toward building electric vehicles. In this paper, we express our concern over the rising global energy consumption, which motivates us to convert to renewable energy sources. We can conserve energy in many different ways across a range of industries. The conversion of stationary exercise bikes to electric bikes is our primary goal. As there is less pollution, low maintenance costs, and reduced noise, we employ an electrical motor (BLDC motor) in these electric bikes instead of a combustion engine. The rechargeable battery packs chemical energy is used by these bikes. This paper discusses the design and development of electric bikes from conserving energy by pedaling the stationary exercise.","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132044673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-22DOI: 10.1109/ICIPTM57143.2023.10117607
S. Subha, Rahul, Jaichandran R K, Dhinakaran K, R. YUVARAJ, S. Mudradi
Independent monitoring as well as video surveillance have a lengthy history. In both controlled indoor and outdoor environments, many currently available devices can accurately monitor human mobility. As a constant part of our everyday lives, low-light conditions have a significant impact. Nevertheless, one of the biggest challenges in visual surveillance is still object detection at night. There has been a rise in poor light image studies, especially in the area of image improvement, but no relevant database serves as a standard. One use of object detection is the remote or centralized management of a large number of security and video surveillance devices. It is suggested that night vision monitoring could benefit from the use of an object detection technique. The method relies on detecting motion. PIR sensors might pick up on unnoticed motion to kick off the search. Due to motion prediction, this method works well in practice for night-time detection. Furthermore, we discuss our interesting and insightful findings concerning the impacts of low light on the object detection job on developing a Deep Learning (DL) method. If an object is spotted, an alert message is sent to the user's registered mobile phone through GSM technology, and send an email with a half-minute video clip of the surroundings. Our investigation on dark images is meant to pave the way for more studies in the low-light domain.01
{"title":"Visual Object Detection in Extreme Dark Condition","authors":"S. Subha, Rahul, Jaichandran R K, Dhinakaran K, R. YUVARAJ, S. Mudradi","doi":"10.1109/ICIPTM57143.2023.10117607","DOIUrl":"https://doi.org/10.1109/ICIPTM57143.2023.10117607","url":null,"abstract":"Independent monitoring as well as video surveillance have a lengthy history. In both controlled indoor and outdoor environments, many currently available devices can accurately monitor human mobility. As a constant part of our everyday lives, low-light conditions have a significant impact. Nevertheless, one of the biggest challenges in visual surveillance is still object detection at night. There has been a rise in poor light image studies, especially in the area of image improvement, but no relevant database serves as a standard. One use of object detection is the remote or centralized management of a large number of security and video surveillance devices. It is suggested that night vision monitoring could benefit from the use of an object detection technique. The method relies on detecting motion. PIR sensors might pick up on unnoticed motion to kick off the search. Due to motion prediction, this method works well in practice for night-time detection. Furthermore, we discuss our interesting and insightful findings concerning the impacts of low light on the object detection job on developing a Deep Learning (DL) method. If an object is spotted, an alert message is sent to the user's registered mobile phone through GSM technology, and send an email with a half-minute video clip of the surroundings. Our investigation on dark images is meant to pave the way for more studies in the low-light domain.01","PeriodicalId":178817,"journal":{"name":"2023 3rd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122284355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}