Pub Date : 2023-03-01DOI: 10.1109/ICSMDI57622.2023.00083
Yixuan Li
Energy transition optimization based on computer assisted energy efficiency intelligent simulation algorithm is the main focus of this manuscript. According to relevant data, our country's annual industrial energy consumption and residential energy consumption are both increasing. Hence, the efficient monitoring is essential. Our target is to achieve the transition optimization. Electrification is a key move in the clean energy transition. Hence, a novel system is designed, the proposed energy consumption monitoring APP interface based on cloud data collection allows users to choose to manually input data or access data from the cloud. Through the testing, the performance is then validated.
{"title":"Energy Transition Optimization based on Computer Assisted Energy Efficiency and Intelligent Simulation Algorithm","authors":"Yixuan Li","doi":"10.1109/ICSMDI57622.2023.00083","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00083","url":null,"abstract":"Energy transition optimization based on computer assisted energy efficiency intelligent simulation algorithm is the main focus of this manuscript. According to relevant data, our country's annual industrial energy consumption and residential energy consumption are both increasing. Hence, the efficient monitoring is essential. Our target is to achieve the transition optimization. Electrification is a key move in the clean energy transition. Hence, a novel system is designed, the proposed energy consumption monitoring APP interface based on cloud data collection allows users to choose to manually input data or access data from the cloud. Through the testing, the performance is then validated.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133736415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1109/ICSMDI57622.2023.00021
Elvina Jacia, Gabriel Dyan, Amelia Ifan, F. Gaol, T. Matsuo
The use of technology nowadays does not feel strange. Everyday people who use technology for their daily needs, starting with each other, seeking knowledge, can even earn income by doing business using technology. Social media is a tool that can be used by people to become with each other by creating, sharing, and exchanging information virtually through a network. However, in the current era, the notion of social media is not only about exchanging information, but also to support business products. The problem is how to compete tightly in this modern era in increasing the selling value of business products. The positive impact of social media for sales in business products are huge such as, increase sales, increase product promotion, greater market distribution. On the other side, the negative impact also takes part such as, the more competitors, the products compete fiercely in the market. This research aims to identify more the impact of social media on sales of business products that focused on business, benefit, and factor. The research method that we used is quantitative which focuses on the number of samples of respondents to support the research results and the results are in the form of a graphic that shows the answers of the respondents to the questionnaire.
{"title":"The Social Media Implications on the Sales of Business Products","authors":"Elvina Jacia, Gabriel Dyan, Amelia Ifan, F. Gaol, T. Matsuo","doi":"10.1109/ICSMDI57622.2023.00021","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00021","url":null,"abstract":"The use of technology nowadays does not feel strange. Everyday people who use technology for their daily needs, starting with each other, seeking knowledge, can even earn income by doing business using technology. Social media is a tool that can be used by people to become with each other by creating, sharing, and exchanging information virtually through a network. However, in the current era, the notion of social media is not only about exchanging information, but also to support business products. The problem is how to compete tightly in this modern era in increasing the selling value of business products. The positive impact of social media for sales in business products are huge such as, increase sales, increase product promotion, greater market distribution. On the other side, the negative impact also takes part such as, the more competitors, the products compete fiercely in the market. This research aims to identify more the impact of social media on sales of business products that focused on business, benefit, and factor. The research method that we used is quantitative which focuses on the number of samples of respondents to support the research results and the results are in the form of a graphic that shows the answers of the respondents to the questionnaire.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130404651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1109/ICSMDI57622.2023.00090
Prahasith Naru, Siva Kanth Reddy Chinthala, Pagadala Guna Sekhar, Chadala Ajay Kumar, Padmanaban K, Velmurugan A. K
Phishing websites are harmful websites that spoof legitimate web pages to get sensitive information from users as login, account, and bank card info. Detecting these hoax websites is a difficult topic since hacking is mostly a semantics-based assault that targets human vulnerabilities rather than network or system flaws. Machine learning systems can identify phishing assaults and have greater adaptability for forms of hack attempts, hence these are widely used. To employ this sort of method, input characteristics should be properly chosen. These aspects determine the overall performance of the solution. In this paper, two techniques Logistic Regression and Multinomial Naïve Bayes are extensively used in detecting these websites using phishing-url datasets. Out of these, Logistic Regression has achieved the highest accuracy results of 97%.
{"title":"Detection of Fake Websites using Machine Learning Techniques","authors":"Prahasith Naru, Siva Kanth Reddy Chinthala, Pagadala Guna Sekhar, Chadala Ajay Kumar, Padmanaban K, Velmurugan A. K","doi":"10.1109/ICSMDI57622.2023.00090","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00090","url":null,"abstract":"Phishing websites are harmful websites that spoof legitimate web pages to get sensitive information from users as login, account, and bank card info. Detecting these hoax websites is a difficult topic since hacking is mostly a semantics-based assault that targets human vulnerabilities rather than network or system flaws. Machine learning systems can identify phishing assaults and have greater adaptability for forms of hack attempts, hence these are widely used. To employ this sort of method, input characteristics should be properly chosen. These aspects determine the overall performance of the solution. In this paper, two techniques Logistic Regression and Multinomial Naïve Bayes are extensively used in detecting these websites using phishing-url datasets. Out of these, Logistic Regression has achieved the highest accuracy results of 97%.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116393704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1109/ICSMDI57622.2023.00028
D. Mittal, Harmeet Singh
The potential of XAI in detecting hate speech using deep learning models is versatile and multifaceted. To better understand the decision-making process of complex AI models, this study applied XAI to the dataset and investigated the interpretability and explanation of their decisions. The data was preprocessed by cleaning, tokenizing, lemmatizing, and removing inconsistencies in tweets. Simplification of categorical variables was also performed during training. Exploratory data analysis was conducted to identify patterns and insights in the dataset. The study used a set of existing models, including LIME, SHAP, XGBoost, and KTrain, to analyze the accuracy. The KTrain model achieved the highest accuracy and lowest loss among the variants developed to increase explainability.
{"title":"Enhancing Hate Speech Detection through Explainable AI","authors":"D. Mittal, Harmeet Singh","doi":"10.1109/ICSMDI57622.2023.00028","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00028","url":null,"abstract":"The potential of XAI in detecting hate speech using deep learning models is versatile and multifaceted. To better understand the decision-making process of complex AI models, this study applied XAI to the dataset and investigated the interpretability and explanation of their decisions. The data was preprocessed by cleaning, tokenizing, lemmatizing, and removing inconsistencies in tweets. Simplification of categorical variables was also performed during training. Exploratory data analysis was conducted to identify patterns and insights in the dataset. The study used a set of existing models, including LIME, SHAP, XGBoost, and KTrain, to analyze the accuracy. The KTrain model achieved the highest accuracy and lowest loss among the variants developed to increase explainability.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122881342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1109/ICSMDI57622.2023.00056
D. Sudarsan, D. Sankar
Palm leaf manuscripts are the first form of writing materials and are the special repositories of information from several ages that have enlightened humanity on a variety of themes, including medicine, astronomy, mathematics, and astrology. Due to the lack of proper preservation techniques, these manuscripts are disappearing at an alarm rate. This necessitates the digitization of these manuscripts. In this paper, initially the major steps in digitization process are presented. Then, an intensive review is conducted on the available work in every step of digitizing Palm leaf manuscript. This study also analyzes the accuracy, efficiency, and superiority of each method and identifies the best method currently available for each step in the automatic palm leaf manuscript digitization process.
{"title":"An Overview of Character Recognition from Palm Leaf Manuscripts","authors":"D. Sudarsan, D. Sankar","doi":"10.1109/ICSMDI57622.2023.00056","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00056","url":null,"abstract":"Palm leaf manuscripts are the first form of writing materials and are the special repositories of information from several ages that have enlightened humanity on a variety of themes, including medicine, astronomy, mathematics, and astrology. Due to the lack of proper preservation techniques, these manuscripts are disappearing at an alarm rate. This necessitates the digitization of these manuscripts. In this paper, initially the major steps in digitization process are presented. Then, an intensive review is conducted on the available work in every step of digitizing Palm leaf manuscript. This study also analyzes the accuracy, efficiency, and superiority of each method and identifies the best method currently available for each step in the automatic palm leaf manuscript digitization process.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125220238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1109/ICSMDI57622.2023.00038
Lei Huang, S. Fan
The concept of mobile GIS is based on traditional GIS, using certain spatial positioning means, such as GPS, inertial navigation, etc., combined with embedded technology, using digital maps as the display background, and providing real-time positions of moving targets through basic wireless communication networks. Inspired by this background, this paper proposes the novel navigation system based on the prior knowledge. The portable navigation and positioning device can be realized by further integrating the PDA and also the positioning module on the hardware, for the core, namely, the inner framework, the Beidou system is selected. Then, the system is applied to the sample scenarios, it can be seen from the simulated UI that the designed model is user-friendly.
{"title":"Intelligence Modeling of Navigation System based on Prior Knowledge","authors":"Lei Huang, S. Fan","doi":"10.1109/ICSMDI57622.2023.00038","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00038","url":null,"abstract":"The concept of mobile GIS is based on traditional GIS, using certain spatial positioning means, such as GPS, inertial navigation, etc., combined with embedded technology, using digital maps as the display background, and providing real-time positions of moving targets through basic wireless communication networks. Inspired by this background, this paper proposes the novel navigation system based on the prior knowledge. The portable navigation and positioning device can be realized by further integrating the PDA and also the positioning module on the hardware, for the core, namely, the inner framework, the Beidou system is selected. Then, the system is applied to the sample scenarios, it can be seen from the simulated UI that the designed model is user-friendly.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121689728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1109/ICSMDI57622.2023.00048
Shweta Katoch, Vaneet Garg
Every person is using smartphones these days, and most of the users are Android users, with this Android applications are running on a huge scale. In the final quarter of 2022, Android is considered as the market leader among other mobile operating systems, holding a market share of over 71.8 percent, which leads to the mass development of Android applications and also leads to a problem where some applications are developed by young developers without considering the security factor and are easily downloadable from Google Play Store and open source. Since Android is open source and allows developers to create applications without restriction, some inexperienced developers create numerous apps without being aware of the most recent Android security challenges. As a result, these apps have an open attack surface that hackers can use to steal user data. Installing such apps can put other secure apps and system in danger, and once a bad app is installed, it will have an impact on the entire system. The goal of this research is to identify vulnerabilities in Android applications and the techniques used to find and inspect vulnerabilities. Penetration testing identifies security flaws and aids in network security. This paper will help future authors to understand several elements of penetration testing, including tools, attack methodologies and defence strategies. More particularly, this study has performed reverse engineering by performing penetration tests using a private network, devices and tools. The results are then summarised and discussed. This study also described about the specific procedures and techniques used to carry out these attacks.
{"title":"Security Analysis on Android Application Through Penetration Testing using Reverse Engineering","authors":"Shweta Katoch, Vaneet Garg","doi":"10.1109/ICSMDI57622.2023.00048","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00048","url":null,"abstract":"Every person is using smartphones these days, and most of the users are Android users, with this Android applications are running on a huge scale. In the final quarter of 2022, Android is considered as the market leader among other mobile operating systems, holding a market share of over 71.8 percent, which leads to the mass development of Android applications and also leads to a problem where some applications are developed by young developers without considering the security factor and are easily downloadable from Google Play Store and open source. Since Android is open source and allows developers to create applications without restriction, some inexperienced developers create numerous apps without being aware of the most recent Android security challenges. As a result, these apps have an open attack surface that hackers can use to steal user data. Installing such apps can put other secure apps and system in danger, and once a bad app is installed, it will have an impact on the entire system. The goal of this research is to identify vulnerabilities in Android applications and the techniques used to find and inspect vulnerabilities. Penetration testing identifies security flaws and aids in network security. This paper will help future authors to understand several elements of penetration testing, including tools, attack methodologies and defence strategies. More particularly, this study has performed reverse engineering by performing penetration tests using a private network, devices and tools. The results are then summarised and discussed. This study also described about the specific procedures and techniques used to carry out these attacks.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1109/ICSMDI57622.2023.00092
Thiruvikraman B R, A. Prasath
Agriculture has become extremely vital in human lives. Food is essential for all living beings to survive. Crop output yield has recently become a crucial factor. But these days, it is harder to acquire the ideal crop yield because certain disease influence the crops during their growth and occasionally go undiscovered by some farmers, which leads to the poor crop yield. This study focuses on using machine learning techniques to identify diseases that have an impact on crop yields during a specific season, and then adding fertilizers and nutrients to the crops to assist them in fighting off disease and aid farmers in producing high-quality crops.
{"title":"Prediction of Seasonal Crop Diseases using Machine Learning Algorithm","authors":"Thiruvikraman B R, A. Prasath","doi":"10.1109/ICSMDI57622.2023.00092","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00092","url":null,"abstract":"Agriculture has become extremely vital in human lives. Food is essential for all living beings to survive. Crop output yield has recently become a crucial factor. But these days, it is harder to acquire the ideal crop yield because certain disease influence the crops during their growth and occasionally go undiscovered by some farmers, which leads to the poor crop yield. This study focuses on using machine learning techniques to identify diseases that have an impact on crop yields during a specific season, and then adding fertilizers and nutrients to the crops to assist them in fighting off disease and aid farmers in producing high-quality crops.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1109/ICSMDI57622.2023.00081
Dhwanil Chauhan, Margi Shah, Harshil Joshi
An exponential increase has been observed in the amount of IOT devices. The demand for an intrusion detection system has increased with the proliferation of IOT devices. An intrusion detection system is made of machine learning algorithms or a combination of machine learning algorithms. These algorithms are used to identify and classify intrusions. This study compares the results obtained by applying Support Vector Classifier, Decision Tree Classifier and Random Forest Classifier on the CICIDS -17.
{"title":"A Novel Intrusion Detection System based on Machine Learning for Internet of Things (IoT) Devices","authors":"Dhwanil Chauhan, Margi Shah, Harshil Joshi","doi":"10.1109/ICSMDI57622.2023.00081","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00081","url":null,"abstract":"An exponential increase has been observed in the amount of IOT devices. The demand for an intrusion detection system has increased with the proliferation of IOT devices. An intrusion detection system is made of machine learning algorithms or a combination of machine learning algorithms. These algorithms are used to identify and classify intrusions. This study compares the results obtained by applying Support Vector Classifier, Decision Tree Classifier and Random Forest Classifier on the CICIDS -17.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125729726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1109/ICSMDI57622.2023.00039
Jia Liu, Chengzhang Qu, Tianhong Zhou
Nagios monitoring software can incorporate all hosts and network devices into monitoring according to the network topology, and prompt prompts in case of failures. Hence, considering its efficiency, this paper proposes the novel cloud computing platform monitoring system based on N agios. N agios is a monitoring system that monitors system operation and network information. It can run on Linux and Unix platforms, and provides an optional browser-based Web interface to facilitate system administration. In the designed platform, the novel structure is considered to guarantee the efficiency of the model. Through the testing on the core code, the performance is tested.
{"title":"A Novel Cloud Computing Platform Monitoring System based on Nagios","authors":"Jia Liu, Chengzhang Qu, Tianhong Zhou","doi":"10.1109/ICSMDI57622.2023.00039","DOIUrl":"https://doi.org/10.1109/ICSMDI57622.2023.00039","url":null,"abstract":"Nagios monitoring software can incorporate all hosts and network devices into monitoring according to the network topology, and prompt prompts in case of failures. Hence, considering its efficiency, this paper proposes the novel cloud computing platform monitoring system based on N agios. N agios is a monitoring system that monitors system operation and network information. It can run on Linux and Unix platforms, and provides an optional browser-based Web interface to facilitate system administration. In the designed platform, the novel structure is considered to guarantee the efficiency of the model. Through the testing on the core code, the performance is tested.","PeriodicalId":373017,"journal":{"name":"2023 3rd International Conference on Smart Data Intelligence (ICSMDI)","volume":"170 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133453918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}