Pub Date : 2021-02-17DOI: 10.1109/ICIPTM52218.2021.9388353
Astik Naval, Mohd. Momin Aman, Lucky Gaur, A. Khursheed
Internet of things a new concept of the new emerging world of technology, a huge server with massive database interconnectivity between systems and the autonomous nature of machines around us makes an entire system of IOT. But what is the actual meaning of IOT and how is it implemented in our daily lives? According to a research an average person is surrounded by at least 5–10 computers in his daily work schedule however those are not conventional computers but miniature IC's, Numerous Motherboards and so on and so forth. Have we ever thought what ease of work does all these systems, working in sync with us as humans, has to offer? A LOT! What would be The Magnitude of productivity if all these systems could work autonomously without/with very less Human Effort Connected to each other? This is exactly what the INTERNET OF THINGS has to offer. In IOT, Machines around us are connected to each other with the internet which provide a whole lot of provision for the control (the user) to manipulate and use the device according to its own will. IOT is a concept of interconnectivity and technically can be termed as “Cloud Computing” which uses large sets of data around the web for connecting numerous systems with each other and Produce a sustainable working of thesystem.
{"title":"Electronics and Internet of Things Integration","authors":"Astik Naval, Mohd. Momin Aman, Lucky Gaur, A. Khursheed","doi":"10.1109/ICIPTM52218.2021.9388353","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388353","url":null,"abstract":"Internet of things a new concept of the new emerging world of technology, a huge server with massive database interconnectivity between systems and the autonomous nature of machines around us makes an entire system of IOT. But what is the actual meaning of IOT and how is it implemented in our daily lives? According to a research an average person is surrounded by at least 5–10 computers in his daily work schedule however those are not conventional computers but miniature IC's, Numerous Motherboards and so on and so forth. Have we ever thought what ease of work does all these systems, working in sync with us as humans, has to offer? A LOT! What would be The Magnitude of productivity if all these systems could work autonomously without/with very less Human Effort Connected to each other? This is exactly what the INTERNET OF THINGS has to offer. In IOT, Machines around us are connected to each other with the internet which provide a whole lot of provision for the control (the user) to manipulate and use the device according to its own will. IOT is a concept of interconnectivity and technically can be termed as “Cloud Computing” which uses large sets of data around the web for connecting numerous systems with each other and Produce a sustainable working of thesystem.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/iciptm52218.2021.9388331
A. Wadhwani, Priyank Jain, Shriya Sahu
There are a lot of ways to communicate in this cyber world. With this increasingly growing era there is also much obstruction in a safe and secure environment. There has been an exponential growth in cyber bullying and abusing. Deep learning methods have recently begun to be used to detect abusive comments made in online forums. Detecting, and classifying, online abusive language is a non-trivial NLP challenge because online comments are made in a wide variety of contexts, and contain words from many different formal and informal lexicons. For this to overcome we design a model that detects the level of toxicity in a message and replaces it with another phrase. It uses a Deep Neural network model that takes a message/comment as an input and checks for various parameters such as Toxic, Severe Toxic, Identity hate, threat, etc. And the application finally then replaces the portion with another word/phrase. Examining things, you care about can be troublesome. The danger of misuse and provocation online implies that numerous individuals quit communicating and offer up on looking for changed thoughts. Stages battle to adequately encourage discussions, driving numerous networks to restrict or totally shut down client remarks.
{"title":"Injurious Comment Detection and Removal utilizing Neural Network","authors":"A. Wadhwani, Priyank Jain, Shriya Sahu","doi":"10.1109/iciptm52218.2021.9388331","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388331","url":null,"abstract":"There are a lot of ways to communicate in this cyber world. With this increasingly growing era there is also much obstruction in a safe and secure environment. There has been an exponential growth in cyber bullying and abusing. Deep learning methods have recently begun to be used to detect abusive comments made in online forums. Detecting, and classifying, online abusive language is a non-trivial NLP challenge because online comments are made in a wide variety of contexts, and contain words from many different formal and informal lexicons. For this to overcome we design a model that detects the level of toxicity in a message and replaces it with another phrase. It uses a Deep Neural network model that takes a message/comment as an input and checks for various parameters such as Toxic, Severe Toxic, Identity hate, threat, etc. And the application finally then replaces the portion with another word/phrase. Examining things, you care about can be troublesome. The danger of misuse and provocation online implies that numerous individuals quit communicating and offer up on looking for changed thoughts. Stages battle to adequately encourage discussions, driving numerous networks to restrict or totally shut down client remarks.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132362072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/ICIPTM52218.2021.9388372
C. P. Mallikarjuna Gowda, Raju Hajare, P. Pavan
In this paper, the problem of object recognition faced by visually impaired people in their daily life is considered. This problem causes them to face problem while crossing road and sometimes land them in the scenario of accident. In the literature different assistive solutions have been proposed to assist the visually impaired people. Some of them are Assistance from stick, Robot Assistance and Assistance by the visually fit people. Assistance from stick helps them to sense the object and also helps them to carry out various activities such as walking, negotiating a crowd and so on, but at the same time they won't know the object that is in front of them. Robots help them to navigate from one place to another, but at the same time it is highly expensive. Assistance from visually fit people is not a viable solution since; nowadays in this busy world people do not find time to help others. Looking at the problems faced by the visually impaired people, an assistive technology solution is being proposed by leveraging Internet of Thing (IoT), Machine Learning and Embedded Technologies for the visually impaired that helps them to move from one place to another without depending on others. The solution employs Google Tensor Flow Machine Learning Framework for the classification of the real-world objects. Therefore, the proposed system can rise the cognizance of the explored environment, it interacts with its user by means of audio messages and at the same time it is a cost-effective solution.
{"title":"Design and Development of Cognitive IoT Assistance System for Visually Impaired","authors":"C. P. Mallikarjuna Gowda, Raju Hajare, P. Pavan","doi":"10.1109/ICIPTM52218.2021.9388372","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388372","url":null,"abstract":"In this paper, the problem of object recognition faced by visually impaired people in their daily life is considered. This problem causes them to face problem while crossing road and sometimes land them in the scenario of accident. In the literature different assistive solutions have been proposed to assist the visually impaired people. Some of them are Assistance from stick, Robot Assistance and Assistance by the visually fit people. Assistance from stick helps them to sense the object and also helps them to carry out various activities such as walking, negotiating a crowd and so on, but at the same time they won't know the object that is in front of them. Robots help them to navigate from one place to another, but at the same time it is highly expensive. Assistance from visually fit people is not a viable solution since; nowadays in this busy world people do not find time to help others. Looking at the problems faced by the visually impaired people, an assistive technology solution is being proposed by leveraging Internet of Thing (IoT), Machine Learning and Embedded Technologies for the visually impaired that helps them to move from one place to another without depending on others. The solution employs Google Tensor Flow Machine Learning Framework for the classification of the real-world objects. Therefore, the proposed system can rise the cognizance of the explored environment, it interacts with its user by means of audio messages and at the same time it is a cost-effective solution.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115669255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/iciptm52218.2021.9388319
Priya Shrivastava, D. Sharma
In the wide area of personalized user based recommendation, although resource attribute is one the biggest important factors in recognizing user preferences, the researchers take into consideration among the user interest differences in resource attribute. As per previous research, both prediction and similarity computation are not extremely precise. There are some areas which have some space for improvements. In terms of accuracy, this paper proposed a modified ratio based multi-attribute method to calculate the similarity, providing us a new evaluation model of user interest based on resource multi-attribute. By comparing the multi attribute values we can find similarity between users and items using PARAFAC algorithm which is also responsible to handle large dataset and parallel computation among multi-attribute. This proposed method is also able to evaluate performance using this large data set of real web services whose experimental results explain that proposed method, in this paper, achieve better prediction and take less time in computation than various references considered.
{"title":"Web based recommendation system using Multi-attribute collaborative filtering for user satisfaction","authors":"Priya Shrivastava, D. Sharma","doi":"10.1109/iciptm52218.2021.9388319","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388319","url":null,"abstract":"In the wide area of personalized user based recommendation, although resource attribute is one the biggest important factors in recognizing user preferences, the researchers take into consideration among the user interest differences in resource attribute. As per previous research, both prediction and similarity computation are not extremely precise. There are some areas which have some space for improvements. In terms of accuracy, this paper proposed a modified ratio based multi-attribute method to calculate the similarity, providing us a new evaluation model of user interest based on resource multi-attribute. By comparing the multi attribute values we can find similarity between users and items using PARAFAC algorithm which is also responsible to handle large dataset and parallel computation among multi-attribute. This proposed method is also able to evaluate performance using this large data set of real web services whose experimental results explain that proposed method, in this paper, achieve better prediction and take less time in computation than various references considered.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116093589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/iciptm52218.2021.9388361
Hemlata
In today's age of technology, sharing of information and transfer of data has increased rapidly. The problem of facing the third party accessing the has been the issue of highly concern for the experts of data communication. The security measures plays an important role to provide authentication only of the authorized person, with accuracy, safety and integrity of data and resources. This method is to gain secure communication. There are number of techniques for security of data. To enhance the security to made the data safe from un authorized users “MODREN TECHNIQUE OF ENCRYPTION DECRYPTION BASED ON IMAGE.” Is designed by using key generation, key exchange and binary complements for data (text/image) authentication.
{"title":"Modern Technique of Encryption Decryption Based On Image","authors":"Hemlata","doi":"10.1109/iciptm52218.2021.9388361","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388361","url":null,"abstract":"In today's age of technology, sharing of information and transfer of data has increased rapidly. The problem of facing the third party accessing the has been the issue of highly concern for the experts of data communication. The security measures plays an important role to provide authentication only of the authorized person, with accuracy, safety and integrity of data and resources. This method is to gain secure communication. There are number of techniques for security of data. To enhance the security to made the data safe from un authorized users “MODREN TECHNIQUE OF ENCRYPTION DECRYPTION BASED ON IMAGE.” Is designed by using key generation, key exchange and binary complements for data (text/image) authentication.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116161211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/ICIPTM52218.2021.9388360
S. Khant, Atul Patel
Covid19 pandemic has affected all sectors including academic institutions. In countries like India, population is at peak and risk factor for infection is high if government allows to start the institute in full fledge. It is stressful for students and researchers to work without any hardware support. The goal of the paper is to help the academicians and researchers by looking into the system with new simulation techniques. Various experiments related to embedded system are simulated and working is demonstrated through the help of online simulation tools. All important analog interface sensors are demonstrated with this online tool. Various issues occurred during simulations, block diagram, algorithms and results are also discussed. By studying these issues students can able to learn the basic concepts and fundamentals related to interfacing devices and components with your embedded system. As the simulation system is online. The reliability and flexibility issues are also considered. Simulation tool uses all virtual electronics components like analog and digital sensors, Controllers (Arduino), switches, LED and LCD displays and many more.
{"title":"COVID19 Remote Engineering Education: Learning of an Embedded System with Practical Perspective","authors":"S. Khant, Atul Patel","doi":"10.1109/ICIPTM52218.2021.9388360","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388360","url":null,"abstract":"Covid19 pandemic has affected all sectors including academic institutions. In countries like India, population is at peak and risk factor for infection is high if government allows to start the institute in full fledge. It is stressful for students and researchers to work without any hardware support. The goal of the paper is to help the academicians and researchers by looking into the system with new simulation techniques. Various experiments related to embedded system are simulated and working is demonstrated through the help of online simulation tools. All important analog interface sensors are demonstrated with this online tool. Various issues occurred during simulations, block diagram, algorithms and results are also discussed. By studying these issues students can able to learn the basic concepts and fundamentals related to interfacing devices and components with your embedded system. As the simulation system is online. The reliability and flexibility issues are also considered. Simulation tool uses all virtual electronics components like analog and digital sensors, Controllers (Arduino), switches, LED and LCD displays and many more.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125507691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/ICIPTM52218.2021.9388367
Simarjeet Kaur, Jimmy Singla, Nikita, Amar Singh
In recent times, with rapid growth in technology, medical imaging has become popular in healthcare. The impression of these improvements in the medical field has become evident that technology can able to diagnose disease in a much better way than before. Medical images play a vital role in the detection and prediction of disease but these images may tend to corrupt by some kind of noise or artifacts during the image acquisition process. The presence of noise makes images unclear, fine details and features of the original image are lost which leads to inaccurate detection of disease. Hence, different denoising methods are required to eliminate noise without losing image features (edges, corners, and other sharp structures). Researchers have already proposed different tools and techniques to reduce noise. Each technique has its merits and demerits. Hence preprocessing of medical images is a mandatory and essential process to get accurate results. This review article provides a comprehensive survey of different noises, denoising models, contrast enhancement methods, quality matrices. In addition, the main aim of this paper is to conduct a detailed analysis of various preprocessing techniques used on medical images which include Computed Tomography (CT), Magnetic Resonance images (MRI), Positron Emission Tomography (PET), 2D/3DULTRASOUND images.
{"title":"Review on Medical Image Denoising Techniques","authors":"Simarjeet Kaur, Jimmy Singla, Nikita, Amar Singh","doi":"10.1109/ICIPTM52218.2021.9388367","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388367","url":null,"abstract":"In recent times, with rapid growth in technology, medical imaging has become popular in healthcare. The impression of these improvements in the medical field has become evident that technology can able to diagnose disease in a much better way than before. Medical images play a vital role in the detection and prediction of disease but these images may tend to corrupt by some kind of noise or artifacts during the image acquisition process. The presence of noise makes images unclear, fine details and features of the original image are lost which leads to inaccurate detection of disease. Hence, different denoising methods are required to eliminate noise without losing image features (edges, corners, and other sharp structures). Researchers have already proposed different tools and techniques to reduce noise. Each technique has its merits and demerits. Hence preprocessing of medical images is a mandatory and essential process to get accurate results. This review article provides a comprehensive survey of different noises, denoising models, contrast enhancement methods, quality matrices. In addition, the main aim of this paper is to conduct a detailed analysis of various preprocessing techniques used on medical images which include Computed Tomography (CT), Magnetic Resonance images (MRI), Positron Emission Tomography (PET), 2D/3DULTRASOUND images.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131890602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/iciptm52218.2021.9388343
Malini Singh, Sudipta Mukherjee, A. Mukhopadhyay
Planning is an integral part of any business. Industry or business cannot successfully move further without proper planning. Hospitality business contributes a considerable amount to the country's economy. It is considered as a significant source of employment for every country because it involves massive human resources to render the service. On the other hand, a high amount of investment is needed to establish proper infrastructure to cater to the need of every customer, i.e. tourists in different categories. Thus hotel planning should be done very carefully. It is noticed that many hotels are running in the loss in India or other countries due to faulty planning and management. There is a need for proper scientific planning before constructing any hotel. Measurement of different parameters and criteria should be carefully verified and monitored by using statistical tools before the project is begun. In this paper, researchers have tried to propose a conceptual model by identifying different criteria and parameters which are mandatory for hotel planning. Researchers have also shown a conceptual framework of hotel site selection process by using Geographic Information System (GIS) as a part of scientific decision-making tools which is also known as Spatial Decision Support System (SDSS). An analysis is also made by formulating a model to show that GIS based decision-making process is very much scientific and can be used in effective hotel planning.
{"title":"Hotel Site Planning Using Geographic Information System-Proposed Conceptual Model for Darjeeling District","authors":"Malini Singh, Sudipta Mukherjee, A. Mukhopadhyay","doi":"10.1109/iciptm52218.2021.9388343","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388343","url":null,"abstract":"Planning is an integral part of any business. Industry or business cannot successfully move further without proper planning. Hospitality business contributes a considerable amount to the country's economy. It is considered as a significant source of employment for every country because it involves massive human resources to render the service. On the other hand, a high amount of investment is needed to establish proper infrastructure to cater to the need of every customer, i.e. tourists in different categories. Thus hotel planning should be done very carefully. It is noticed that many hotels are running in the loss in India or other countries due to faulty planning and management. There is a need for proper scientific planning before constructing any hotel. Measurement of different parameters and criteria should be carefully verified and monitored by using statistical tools before the project is begun. In this paper, researchers have tried to propose a conceptual model by identifying different criteria and parameters which are mandatory for hotel planning. Researchers have also shown a conceptual framework of hotel site selection process by using Geographic Information System (GIS) as a part of scientific decision-making tools which is also known as Spatial Decision Support System (SDSS). An analysis is also made by formulating a model to show that GIS based decision-making process is very much scientific and can be used in effective hotel planning.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134450732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-17DOI: 10.1109/ICIPTM52218.2021.9388369
Akanksha, Muskan Gupta, M. M. Tripathi
This paper proposes a robotic bot to collect the litter thrown and segregate the garbage so as to reduce human effort and keep the environment clean. The proposed robotic bot autonomously identifies garbage and classifies it into biodegradable and non-biodegradable. The final collected garbage is, in a way, segregated automatically. The robot moves towards the garbage just like a rag picker does. When the robot's bins are full, a signalling system is created. This autonomous bot is capable of collecting, segregating and providing signals if the garbage bin is full. The yolov4 model was used to train a dataset of 10,000 images of both the categories and the model was able to detectthe test images with adequate efficiency of 99.66 percent, making it promising candidate for using as an alternative to human effort.
{"title":"Smart Robot for Collection and Segregation of Garbage","authors":"Akanksha, Muskan Gupta, M. M. Tripathi","doi":"10.1109/ICIPTM52218.2021.9388369","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388369","url":null,"abstract":"This paper proposes a robotic bot to collect the litter thrown and segregate the garbage so as to reduce human effort and keep the environment clean. The proposed robotic bot autonomously identifies garbage and classifies it into biodegradable and non-biodegradable. The final collected garbage is, in a way, segregated automatically. The robot moves towards the garbage just like a rag picker does. When the robot's bins are full, a signalling system is created. This autonomous bot is capable of collecting, segregating and providing signals if the garbage bin is full. The yolov4 model was used to train a dataset of 10,000 images of both the categories and the model was able to detectthe test images with adequate efficiency of 99.66 percent, making it promising candidate for using as an alternative to human effort.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134487107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study throws light on the usage of Behavioral Biometrics in Digital banking arena. In current scenario more of physiological biometric modalities are being used in Digital Banking in comparison to psychological/ behavioral modalities which are difficult to record or mimic making behavioral biometrics more secure against replay attacks. This study suggests the usage of mobile screen swipe and touch data for user verification. The experiments were performed using publicly available UMDAA02 mobile swipe data set. The results of the study present a fine-tuned feature set for a swipe-based authentication system for mobile devices used for Digital Banking. It has been observed that with the suggested feature set, K-NN outperforms Naïve bays and SVM algorithms with the best EER of 14%. With the kind of performance shown by K-NN this study strongly suggests, swipe-based authentication system that can be used as a secondary layer of security in the digital banking system.
{"title":"Behavioral Biometrics for Adaptive Authentication in Digital Banking - Guard Against Flawless Privacy","authors":"Supriya Lamba Sahdev, Saurabh Singh, Navleen Kaur, Laraibe Siddiqui","doi":"10.1109/ICIPTM52218.2021.9388364","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388364","url":null,"abstract":"This study throws light on the usage of Behavioral Biometrics in Digital banking arena. In current scenario more of physiological biometric modalities are being used in Digital Banking in comparison to psychological/ behavioral modalities which are difficult to record or mimic making behavioral biometrics more secure against replay attacks. This study suggests the usage of mobile screen swipe and touch data for user verification. The experiments were performed using publicly available UMDAA02 mobile swipe data set. The results of the study present a fine-tuned feature set for a swipe-based authentication system for mobile devices used for Digital Banking. It has been observed that with the suggested feature set, K-NN outperforms Naïve bays and SVM algorithms with the best EER of 14%. With the kind of performance shown by K-NN this study strongly suggests, swipe-based authentication system that can be used as a secondary layer of security in the digital banking system.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133316065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}