Pub Date : 2022-03-04DOI: 10.1109/ICACTA54488.2022.9753510
S. Malathi, D. Kannan
Autism Spectrum Disorder (ASD) is a significant type of neurological disorder that affects the ability of person's to connect socially and communicate with others. Repetitive and limited patterns of conduct are also a part of ASD. The expenses of autism can spike while a diagnosis is being sought and when therapies are being delivered, but many of these expenditures are ongoing and will stay with a person for the rest of their lives. In order to get better outcomes, machine learning and optimization have extended across a wide variety of professions and specialties. In this paper, an optimization-based classification algorithm namely Robust Artificial Bee Colony Optimization based Classifier (RABCOC) is proposed for precise detection of ASD. RABCOC performs optimization before classification is done. For performing classification, this research work makes use of enhanced decision tree based gradient boosting method. RABCOC is evaluated with three different ASD screening dataset with the metrics Accuracy and F - Measure. Results achieved by RABCOC are compared with existing classifiers and it is found that RABCOC has better performance than existing classifiers towards prediction of ASD.
自闭症谱系障碍(ASD)是一种重要的神经系统疾病,它影响人们与社会联系和与他人沟通的能力。重复和有限的行为模式也是自闭症谱系障碍的一部分。在寻求诊断和提供治疗的过程中,自闭症的费用可能会飙升,但这些费用中的许多是持续的,并将伴随一个人的余生。为了获得更好的结果,机器学习和优化已经扩展到各种各样的专业和专业。本文提出了一种基于优化的分类算法——鲁棒人工蜂群优化分类器(Robust Artificial Bee Colony Optimization based Classifier, RABCOC),用于ASD的精确检测。RABCOC在分类之前进行优化。为了进行分类,本研究使用了基于增强决策树的梯度增强方法。RABCOC用三种不同的ASD筛选数据集进行评估,指标为准确性和F - Measure。将RABCOC的结果与现有的分类器进行比较,发现RABCOC在预测ASD方面比现有的分类器有更好的性能。
{"title":"Robust Artificial Bee Colony Optimization Based Classifier for Prediction of Autism Spectrum Disorder","authors":"S. Malathi, D. Kannan","doi":"10.1109/ICACTA54488.2022.9753510","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753510","url":null,"abstract":"Autism Spectrum Disorder (ASD) is a significant type of neurological disorder that affects the ability of person's to connect socially and communicate with others. Repetitive and limited patterns of conduct are also a part of ASD. The expenses of autism can spike while a diagnosis is being sought and when therapies are being delivered, but many of these expenditures are ongoing and will stay with a person for the rest of their lives. In order to get better outcomes, machine learning and optimization have extended across a wide variety of professions and specialties. In this paper, an optimization-based classification algorithm namely Robust Artificial Bee Colony Optimization based Classifier (RABCOC) is proposed for precise detection of ASD. RABCOC performs optimization before classification is done. For performing classification, this research work makes use of enhanced decision tree based gradient boosting method. RABCOC is evaluated with three different ASD screening dataset with the metrics Accuracy and F - Measure. Results achieved by RABCOC are compared with existing classifiers and it is found that RABCOC has better performance than existing classifiers towards prediction of ASD.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-04DOI: 10.1109/ICACTA54488.2022.9752992
K. M, S. K, P. D
MIMO systems that use multiple LED light sources and photo detectors are attractive for visible communication lights proportion to their acquired capacitive and the number of parallel single input single output channel. The MIMO VLC system overcomes the capacity limitations caused by the limited LED modulate bandwidth by using the high SNR of the SISO channel provided according to general lighting requirements. This paper compares Enhanced Optical OFDM (EOOFDM), that's uses as an excessive-bandwidth performance approach, with 3 famous OFDM (Orthogonal Frequency Division Multiplexing) methods. The proposed mechanism would increase the information switch price through 1/8 instances as compared to different traditional structures, while preserving the identical information level with the ideal approach, the simulation outcomes display that the Eb/No of the proposed machine has expanded through as a minimum 0.65dB. With the ensuing outcomes, EO-OFDM can offer better information cost while OFDM above the channels with confined frequency bands. The simulation outcomes display that this approach can extensively minimize PAPR. At the same time, beneath the LED's non-linear restriction and confined aggressive range, the general achievement of this results is higher above the different competing solutions
{"title":"An Implementation of MIMO and OFDM Based Visible Light Communication System for Indoor Environment","authors":"K. M, S. K, P. D","doi":"10.1109/ICACTA54488.2022.9752992","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752992","url":null,"abstract":"MIMO systems that use multiple LED light sources and photo detectors are attractive for visible communication lights proportion to their acquired capacitive and the number of parallel single input single output channel. The MIMO VLC system overcomes the capacity limitations caused by the limited LED modulate bandwidth by using the high SNR of the SISO channel provided according to general lighting requirements. This paper compares Enhanced Optical OFDM (EOOFDM), that's uses as an excessive-bandwidth performance approach, with 3 famous OFDM (Orthogonal Frequency Division Multiplexing) methods. The proposed mechanism would increase the information switch price through 1/8 instances as compared to different traditional structures, while preserving the identical information level with the ideal approach, the simulation outcomes display that the Eb/No of the proposed machine has expanded through as a minimum 0.65dB. With the ensuing outcomes, EO-OFDM can offer better information cost while OFDM above the channels with confined frequency bands. The simulation outcomes display that this approach can extensively minimize PAPR. At the same time, beneath the LED's non-linear restriction and confined aggressive range, the general achievement of this results is higher above the different competing solutions","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117331217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-04DOI: 10.1109/ICACTA54488.2022.9753550
R. Prabha, Senthil G. A, N. N. Saranya, A. M, K. Somasundaram, K. C
Heterogeneous wireless networks of the future must be able to satisfy ever increasing demands while also making the best use of available resources. Relaying IoT contact has emerged as a novel promising approach for improving coverage, lowering power consumption, and reducing the possibility of outages. Enabling cooperation among nodes significantly increases throughput in a multi-hop heterogeneous wireless system to provide optimal IoT communication. In recent IoT communication developments, relay selection has a significant impact on network performance. IoT communication, particularly in surveillance-based wireless networks, has a number of advantages over traditional direct communication, and relay selection is widely regarded as a smart way to increase capacity efficiency. The observation of numerous relying approaches prompted the creation of a better way to solve the imprecise nature of wireless networks by using adaptive priority-based relay selection decisions. In this work, a multi-hop terminal scenario, IoT communication to develop an efficient method for selecting a better relay in each IoT device, as well as to investigate the various user options for relay selection parameters. The results is experiments using NS2 (Network simulator) and implementation of Throughput, Packet Delivery Ratio (PDR) and End-to-End Delay performance are tested.
{"title":"Design of Adaptive Priority Based IoT Communication in Wireless Network","authors":"R. Prabha, Senthil G. A, N. N. Saranya, A. M, K. Somasundaram, K. C","doi":"10.1109/ICACTA54488.2022.9753550","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753550","url":null,"abstract":"Heterogeneous wireless networks of the future must be able to satisfy ever increasing demands while also making the best use of available resources. Relaying IoT contact has emerged as a novel promising approach for improving coverage, lowering power consumption, and reducing the possibility of outages. Enabling cooperation among nodes significantly increases throughput in a multi-hop heterogeneous wireless system to provide optimal IoT communication. In recent IoT communication developments, relay selection has a significant impact on network performance. IoT communication, particularly in surveillance-based wireless networks, has a number of advantages over traditional direct communication, and relay selection is widely regarded as a smart way to increase capacity efficiency. The observation of numerous relying approaches prompted the creation of a better way to solve the imprecise nature of wireless networks by using adaptive priority-based relay selection decisions. In this work, a multi-hop terminal scenario, IoT communication to develop an efficient method for selecting a better relay in each IoT device, as well as to investigate the various user options for relay selection parameters. The results is experiments using NS2 (Network simulator) and implementation of Throughput, Packet Delivery Ratio (PDR) and End-to-End Delay performance are tested.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116184361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-04DOI: 10.1109/ICACTA54488.2022.9752789
A. M, S. M, Vallimaharajan G, Udhayanan C
This Child Safety Monitoring System transmits a warning to the parent or guardian if a child is left inadvertently in the car. The deaths related to children left in cars recur even though many systems thus far exist. This developed system aims at making a move in preventing these accidents. This system can classify images in real-time using Machine Learning, which consists of an Arduino Pro Mini board equipped with an IR Proximity Sensor to detect whether the car doors are closed or not. An own, unique dataset has been developed with eight individual children. The Haar-like feature algorithm is chosen to detect individual faces, which uses Haar features and Integral Images and helps at the stage of feature extraction. The Local Binary Pattern Histogram has been utilized for facial recognition. The suggested study shows that the LBPH algorithm is a more popular and accurate face recognition algorithm when compared to the Eigenfaces and Fisherfaces algorithm. This LBPH algorithm treats the result as a binary number and visualizes the final result as histograms. The detected child face is sent to the parent or guardian through e-mail only in case of the doors and windows being closed. The results imply that the LBPH algorithm approach generates promising performances for the task of detecting child-like objects, with the highest accuracy of 93.4% and an average accuracy of 89.27%.
这个儿童安全监控系统发送警告给父母或监护人,如果一个孩子被无意地留在车里。尽管目前存在许多系统,但与车内儿童有关的死亡事件仍在发生。这一开发系统的目的是在防止这些事故方面迈出一步。该系统可以利用机器学习对图像进行实时分类,该系统由Arduino Pro Mini板组成,配有红外接近传感器,用于检测车门是否关闭。一个自己的、独特的数据集已经由8个孩子组成。选择Haar类特征算法进行人脸检测,该算法利用Haar特征和积分图像,有助于特征提取阶段。局部二值模式直方图被用于人脸识别。研究表明,LBPH算法是一种比Eigenfaces和Fisherfaces算法更流行、更准确的人脸识别算法。这种LBPH算法将结果视为二进制数,并将最终结果可视化为直方图。只有在门窗关闭的情况下,检测到的孩子的脸才会通过电子邮件发送给父母或监护人。结果表明,LBPH算法方法在类儿童物体检测任务中具有良好的性能,最高准确率为93.4%,平均准确率为89.27%。
{"title":"Child Safety Monitor in Cars Using Machine Learning","authors":"A. M, S. M, Vallimaharajan G, Udhayanan C","doi":"10.1109/ICACTA54488.2022.9752789","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752789","url":null,"abstract":"This Child Safety Monitoring System transmits a warning to the parent or guardian if a child is left inadvertently in the car. The deaths related to children left in cars recur even though many systems thus far exist. This developed system aims at making a move in preventing these accidents. This system can classify images in real-time using Machine Learning, which consists of an Arduino Pro Mini board equipped with an IR Proximity Sensor to detect whether the car doors are closed or not. An own, unique dataset has been developed with eight individual children. The Haar-like feature algorithm is chosen to detect individual faces, which uses Haar features and Integral Images and helps at the stage of feature extraction. The Local Binary Pattern Histogram has been utilized for facial recognition. The suggested study shows that the LBPH algorithm is a more popular and accurate face recognition algorithm when compared to the Eigenfaces and Fisherfaces algorithm. This LBPH algorithm treats the result as a binary number and visualizes the final result as histograms. The detected child face is sent to the parent or guardian through e-mail only in case of the doors and windows being closed. The results imply that the LBPH algorithm approach generates promising performances for the task of detecting child-like objects, with the highest accuracy of 93.4% and an average accuracy of 89.27%.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129050373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-04DOI: 10.1109/ICACTA54488.2022.9753355
M. Aruna, V. Arulkumar, M. Deepa, G. Latha
Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of a load of dealing with redundant data contents. This must be protected to prevent the theft of personal belongings, and privacy must be improved as well. Different research projects have been suggested to ensure the safe management of the information included within the data content. The security of current research projects, on the other hand, still needs improvement. As a result, this method has been suggested to address the security concerns associated with cloud computing. The primary goal of this study effort is to offer a safe environment for cloud users while also increasing the profit of cloud resource providers by managing and securely delivering data contents to the cloud users. The bulk of sectors, including business, finance, the military, and the healthcare industry, do not store data in cloud-based storage systems. This technique is used to attract these kinds of customers. Increasing public acceptance Medical researchers are drawn to cloud computing because it allows them to store their study material in a centralized location and distribute and access it in a more flexible manner. They were collected from numerous individuals who were being evaluated for medical care at the time. Scalable and Enhanced Key Aggregate Cryptosystem is a protected data protection method that provides highly effective security in the health care industry. This approach handles disagreements in the outflow of sensitive information and guarantees the data security deployment of a Cloud-based Intelligent Health Monitoring system for the parties involved in the dispute. Using the suggested method, the encrypted data format of medical and health-care prescriptions is recorded as it passes through the hands of patients and healthcare institutions. To increase the level of security, the double encryption method is used. During the encryption process, the Ciphertext ID is referred to as a class. The keyholder is a master secret key that aids in the retrieval of the secret keys of different kinds of monsters and creatures. The extracted key is transmitted and kept as a single aggregate for the benefit of the patient or client to facilitate decryption. Between the use of a key aggregation cryptosystem and double encryption method, the Cloud-based Intelligent Health Monitoring systems may establish a secure link with Healthcare Organizations and patients. As a result, when compared to prior methods, the results demonstrate that the study methodology achieves high levels of security in terms of confidentiality and integrity, as well as great scalability.
{"title":"Medical Healthcare System with Hybrid Block based Predictive models for Quality preserving in Medical Images using Machine Learning Techniques","authors":"M. Aruna, V. Arulkumar, M. Deepa, G. Latha","doi":"10.1109/ICACTA54488.2022.9753355","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753355","url":null,"abstract":"Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of a load of dealing with redundant data contents. This must be protected to prevent the theft of personal belongings, and privacy must be improved as well. Different research projects have been suggested to ensure the safe management of the information included within the data content. The security of current research projects, on the other hand, still needs improvement. As a result, this method has been suggested to address the security concerns associated with cloud computing. The primary goal of this study effort is to offer a safe environment for cloud users while also increasing the profit of cloud resource providers by managing and securely delivering data contents to the cloud users. The bulk of sectors, including business, finance, the military, and the healthcare industry, do not store data in cloud-based storage systems. This technique is used to attract these kinds of customers. Increasing public acceptance Medical researchers are drawn to cloud computing because it allows them to store their study material in a centralized location and distribute and access it in a more flexible manner. They were collected from numerous individuals who were being evaluated for medical care at the time. Scalable and Enhanced Key Aggregate Cryptosystem is a protected data protection method that provides highly effective security in the health care industry. This approach handles disagreements in the outflow of sensitive information and guarantees the data security deployment of a Cloud-based Intelligent Health Monitoring system for the parties involved in the dispute. Using the suggested method, the encrypted data format of medical and health-care prescriptions is recorded as it passes through the hands of patients and healthcare institutions. To increase the level of security, the double encryption method is used. During the encryption process, the Ciphertext ID is referred to as a class. The keyholder is a master secret key that aids in the retrieval of the secret keys of different kinds of monsters and creatures. The extracted key is transmitted and kept as a single aggregate for the benefit of the patient or client to facilitate decryption. Between the use of a key aggregation cryptosystem and double encryption method, the Cloud-based Intelligent Health Monitoring systems may establish a secure link with Healthcare Organizations and patients. As a result, when compared to prior methods, the results demonstrate that the study methodology achieves high levels of security in terms of confidentiality and integrity, as well as great scalability.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122270355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-04DOI: 10.1109/ICACTA54488.2022.9753559
D. D, J. R
Fog computing that extends the cloud nearby to the IoT devices. The advent of IoT technology generates a huge amount of data and is processed in the cloud, this increases the latency. Many time-sensitive applications are affected by delayed response. Fog computing solves the latency problem by processing near the data generating device. Because of the nature of fog computing mobility support, dynamic environment, geographic distribution, location awareness existing schemes do not provide better security. To address these issues, this paper provides mutual secure authentication between each entity in the fog like between the cloud and fog node, between fog node and gateway, between gateway and IoT device. This security mechanism improves the authentication in the fog network. Mobility-based authentication providing mechanism can be implemented with the MobFogSim mobility dataset that is collected from the Luxembourg traffic. Migration of the node is considered in mobility secure authentication.
{"title":"Enhancing Secure Mutual Authentication in Mobile Fog Computing Environment","authors":"D. D, J. R","doi":"10.1109/ICACTA54488.2022.9753559","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753559","url":null,"abstract":"Fog computing that extends the cloud nearby to the IoT devices. The advent of IoT technology generates a huge amount of data and is processed in the cloud, this increases the latency. Many time-sensitive applications are affected by delayed response. Fog computing solves the latency problem by processing near the data generating device. Because of the nature of fog computing mobility support, dynamic environment, geographic distribution, location awareness existing schemes do not provide better security. To address these issues, this paper provides mutual secure authentication between each entity in the fog like between the cloud and fog node, between fog node and gateway, between gateway and IoT device. This security mechanism improves the authentication in the fog network. Mobility-based authentication providing mechanism can be implemented with the MobFogSim mobility dataset that is collected from the Luxembourg traffic. Migration of the node is considered in mobility secure authentication.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123162405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-04DOI: 10.1109/ICACTA54488.2022.9753531
V. Kiruthika, M. Jagadeeswari, C.Sneha Prabha, V. Vaishnavi, H. Sreejaa
Escape rooms have become highly popular over the last few years which builds one's creativity by making puzzles or clues where the person can find the clues and reach a certain destination. The purpose of the escape room is to improve creative thinking and it also seems to be interesting for the users. Escape rooms can be designed in various interesting worlds in the field of gaming. The users can find the clues by navigating and solving riddles or puzzles that will unlock the doors and finally escape from the environment. These escape rooms use in virtual reality technology where the user can feel the real-time experience as he/she is there inside the environment. The user can also interact with the environment by picking objects, finding the clues, navigation, etc which provides real-time hands-on experience. Escape rooms can be designed as per the choice of the owner who creates the environment. The primary thing required for an escape room is a simple room and as per the assets used, it can be designed at a lower cost. If some changes/advancement is to be done inside the environment, the owner can directly change inside the project in unity software instead of completely changing the environment. The VR simulations can be viewed through many headsets namely HTC Vive, Oculus Rift, Oculus Quest, Google cardboard, etc. The Virtual Reality escape rooms can be created through various engines but this developed escape room is created using a unity engine. This VR escape room is designed for Oculus Quest 2 and it can be viewed through this VR headset.
{"title":"Virtual Reality Based Escape Room","authors":"V. Kiruthika, M. Jagadeeswari, C.Sneha Prabha, V. Vaishnavi, H. Sreejaa","doi":"10.1109/ICACTA54488.2022.9753531","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753531","url":null,"abstract":"Escape rooms have become highly popular over the last few years which builds one's creativity by making puzzles or clues where the person can find the clues and reach a certain destination. The purpose of the escape room is to improve creative thinking and it also seems to be interesting for the users. Escape rooms can be designed in various interesting worlds in the field of gaming. The users can find the clues by navigating and solving riddles or puzzles that will unlock the doors and finally escape from the environment. These escape rooms use in virtual reality technology where the user can feel the real-time experience as he/she is there inside the environment. The user can also interact with the environment by picking objects, finding the clues, navigation, etc which provides real-time hands-on experience. Escape rooms can be designed as per the choice of the owner who creates the environment. The primary thing required for an escape room is a simple room and as per the assets used, it can be designed at a lower cost. If some changes/advancement is to be done inside the environment, the owner can directly change inside the project in unity software instead of completely changing the environment. The VR simulations can be viewed through many headsets namely HTC Vive, Oculus Rift, Oculus Quest, Google cardboard, etc. The Virtual Reality escape rooms can be created through various engines but this developed escape room is created using a unity engine. This VR escape room is designed for Oculus Quest 2 and it can be viewed through this VR headset.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132468461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-04DOI: 10.1109/ICACTA54488.2022.9752887
A. K, P. G, B. Priya
Crowd management is a challenging problem in the pandemic situation to ensure public safety. To overcome the difficulties, many technologies have been incorporated to cope up with the problems. However, the effectiveness of these techniques is limited due to the density of the crowd changing from low to extremely high depending on the time. We propose a robust feature-based approach to deal with the problem of crowd management for people's security. We have evaluated our method using a dataset and have performed a detailed analysis. The crowd is monitored through a surveillance camera and the image is recognized frame by frame using OpenCV and the recognized frame is processed through the YoloV4 and COCO dataset to get the human identification count. When the crowd exceeds the allocated limit “Crowd Exemption Notifier” intimates the organizer. This mechanism could help the common people and the government to withstand the widespread viral disease.
{"title":"Crowd Exemption Notifier","authors":"A. K, P. G, B. Priya","doi":"10.1109/ICACTA54488.2022.9752887","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752887","url":null,"abstract":"Crowd management is a challenging problem in the pandemic situation to ensure public safety. To overcome the difficulties, many technologies have been incorporated to cope up with the problems. However, the effectiveness of these techniques is limited due to the density of the crowd changing from low to extremely high depending on the time. We propose a robust feature-based approach to deal with the problem of crowd management for people's security. We have evaluated our method using a dataset and have performed a detailed analysis. The crowd is monitored through a surveillance camera and the image is recognized frame by frame using OpenCV and the recognized frame is processed through the YoloV4 and COCO dataset to get the human identification count. When the crowd exceeds the allocated limit “Crowd Exemption Notifier” intimates the organizer. This mechanism could help the common people and the government to withstand the widespread viral disease.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132570335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-04DOI: 10.1109/ICACTA54488.2022.9753319
Amoolya G, Arnold Sachith A Hans, V. R. Lakkavalli, Senthil Kumar Swami Durai
In this work a first Automatic Speech Recognition (ASR) for Tulu language is developed. Seven hours of speech database for Tulu is recorded from native speakers in natural conditions for read speech. Kaldi toolkit is employed to develop GMM-HMM and DNN-HMM based ASR systems. Different speech units are employed to build the system and a detailed set of experiments is carried out on the collected dataset. It was observed that because of the lesser data, monophone GMM-HMM models provide better word error rate (WER) when compared to triphone models. More data is required for the system to reach to better performance with triphones.
{"title":"Automatic Speech Recognition for Tulu Language Using Gmm-Hmm and DNN-HMM Techniques","authors":"Amoolya G, Arnold Sachith A Hans, V. R. Lakkavalli, Senthil Kumar Swami Durai","doi":"10.1109/ICACTA54488.2022.9753319","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9753319","url":null,"abstract":"In this work a first Automatic Speech Recognition (ASR) for Tulu language is developed. Seven hours of speech database for Tulu is recorded from native speakers in natural conditions for read speech. Kaldi toolkit is employed to develop GMM-HMM and DNN-HMM based ASR systems. Different speech units are employed to build the system and a detailed set of experiments is carried out on the collected dataset. It was observed that because of the lesser data, monophone GMM-HMM models provide better word error rate (WER) when compared to triphone models. More data is required for the system to reach to better performance with triphones.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132032729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-04DOI: 10.1109/ICACTA54488.2022.9752796
B. Swathi, P. T, P. S, Shankar Y, G. V.
Food safety and hygiene are major concerns when it comes to preventing food waste. In India's major markets the fruits and vegetables are getting wasted due to temperature and humidity fluctuations. The quality of the food (fruits and vegetables) should be examined, and they should be guarded from rotting and decaying due to atmospheric aspects like temperatures, moisture, and shade, which help farmers conserve the food (fruits and vegetables) while in transit. An Android application based on the Internet of Things will be built in this article to monitor environmental elements such as heat, moisture, alcohol percentage, and light exposed. The Arduino UNO, a well-known popular tooling board, is at the heart of this device. Different sensors are interfaced to the Microcontroller board such as the DHT11, MQ3, LDR, $16times 2$ LCD, ESP8266 Wi-Fi, and Image sensor, which are all connected to an Android app where the user is notified with real-time data that defines the food quality. ML will be used to analyze the image captured by the app and predict the condition of the food. The app includes a chatbot that provides information on food quality. The app will suggest nearby organic stores based on the user's location. The app will also support Multilanguage's like English, Telugu, Tamil, Kannada and Hindi which will help the farmers, stakeholders to understand in their local language.
{"title":"Survey on IoT based Farm Freshness Mobile Application","authors":"B. Swathi, P. T, P. S, Shankar Y, G. V.","doi":"10.1109/ICACTA54488.2022.9752796","DOIUrl":"https://doi.org/10.1109/ICACTA54488.2022.9752796","url":null,"abstract":"Food safety and hygiene are major concerns when it comes to preventing food waste. In India's major markets the fruits and vegetables are getting wasted due to temperature and humidity fluctuations. The quality of the food (fruits and vegetables) should be examined, and they should be guarded from rotting and decaying due to atmospheric aspects like temperatures, moisture, and shade, which help farmers conserve the food (fruits and vegetables) while in transit. An Android application based on the Internet of Things will be built in this article to monitor environmental elements such as heat, moisture, alcohol percentage, and light exposed. The Arduino UNO, a well-known popular tooling board, is at the heart of this device. Different sensors are interfaced to the Microcontroller board such as the DHT11, MQ3, LDR, $16times 2$ LCD, ESP8266 Wi-Fi, and Image sensor, which are all connected to an Android app where the user is notified with real-time data that defines the food quality. ML will be used to analyze the image captured by the app and predict the condition of the food. The app includes a chatbot that provides information on food quality. The app will suggest nearby organic stores based on the user's location. The app will also support Multilanguage's like English, Telugu, Tamil, Kannada and Hindi which will help the farmers, stakeholders to understand in their local language.","PeriodicalId":345370,"journal":{"name":"2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}