Kannan P, A. Devaraj, B.Pradheep T Rajan, Swathira P K, Subhikshaa Jayaranim, Shebna V
In this modern era, parents are busy building their lifestyle, carrier etc. As we know it has now become hard because parents have to take care of their children simultaneously, which paves a lot of work pressure and family pressure especially for women. Health of the child is affected and better care has also reduced. So, in order to handle such situation, we use temperature, Humidity, ultra-sonic Sensor. The conditions of the external atmosphere help to detect increased body temperature, babies voice while crying and their movements while they are continuously moving and also indicates the time for the diaper to be changed. If there are any abnormal activities are observed in baby’s atmosphere. An alert message is sent to the parents. In this system a video camera is attached and operated under the microcontroller’s instruction and it records a video when the motion sensor detects any continuous movements. The recorded video is broadcasted in a display to the parents which helps them to monitor baby in live. And in addition, this system detects and displays the status of the infant and alert the respective guardian by collecting values from sensor like temperature sensor, ultrasonic sensor, and also the location value from raspberry pi.
{"title":"IoT Based Smart Cradle Using PI","authors":"Kannan P, A. Devaraj, B.Pradheep T Rajan, Swathira P K, Subhikshaa Jayaranim, Shebna V","doi":"10.3233/apc210268","DOIUrl":"https://doi.org/10.3233/apc210268","url":null,"abstract":"In this modern era, parents are busy building their lifestyle, carrier etc. As we know it has now become hard because parents have to take care of their children simultaneously, which paves a lot of work pressure and family pressure especially for women. Health of the child is affected and better care has also reduced. So, in order to handle such situation, we use temperature, Humidity, ultra-sonic Sensor. The conditions of the external atmosphere help to detect increased body temperature, babies voice while crying and their movements while they are continuously moving and also indicates the time for the diaper to be changed. If there are any abnormal activities are observed in baby’s atmosphere. An alert message is sent to the parents. In this system a video camera is attached and operated under the microcontroller’s instruction and it records a video when the motion sensor detects any continuous movements. The recorded video is broadcasted in a display to the parents which helps them to monitor baby in live. And in addition, this system detects and displays the status of the infant and alert the respective guardian by collecting values from sensor like temperature sensor, ultrasonic sensor, and also the location value from raspberry pi.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Tambe, N.R. Kakad, S. Suryawanshi, S. S. Bhamre
To build a social network or social relations between people, we use social networking platforms like Facebook, Twitter, apps, etc. Using this media, users can share their views and opinions about a particular thing. Many people use their media for personal interests, entertainment, the market stocks, or business purposes. Nowadays, user security is the major concern for social networking sites. Online social networks give a little bit of support regarding content filtering. In this article, we proposed a system that provides security regarding malicious content that is posted on their social networking sites. To filter the content that might be unwanted messages, labeled images, or vulgar images, we proposed three level architecture. The user can use the auto-blocking facility as well.
{"title":"Content Filtering of Social Media Sites Using Machine Learning Techniques","authors":"U. Tambe, N.R. Kakad, S. Suryawanshi, S. S. Bhamre","doi":"10.3233/apc210226","DOIUrl":"https://doi.org/10.3233/apc210226","url":null,"abstract":"To build a social network or social relations between people, we use social networking platforms like Facebook, Twitter, apps, etc. Using this media, users can share their views and opinions about a particular thing. Many people use their media for personal interests, entertainment, the market stocks, or business purposes. Nowadays, user security is the major concern for social networking sites. Online social networks give a little bit of support regarding content filtering. In this article, we proposed a system that provides security regarding malicious content that is posted on their social networking sites. To filter the content that might be unwanted messages, labeled images, or vulgar images, we proposed three level architecture. The user can use the auto-blocking facility as well.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132614802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Savitha, Kodali Lahari Chandana, A. Cathrin Sagayam, S. Bhuvaneswari
Different eye disease has clinical use in defining of the actual status of eye, in the outcome of the medication and other alternatives in the curative phase. Mainly simplicity, clinical nature are the most important requirements for any classification system. In the existing they used different machine learning techniques to detect only single disease. Whereas deep learning system, which is named as Convolutional neural networks (CNNs) can show hierarchical representing of images between disease eye and normal eye pattern.
{"title":"Fundus Image Classification Using Convolutional Neural Network","authors":"U. Savitha, Kodali Lahari Chandana, A. Cathrin Sagayam, S. Bhuvaneswari","doi":"10.3233/apc210277","DOIUrl":"https://doi.org/10.3233/apc210277","url":null,"abstract":"Different eye disease has clinical use in defining of the actual status of eye, in the outcome of the medication and other alternatives in the curative phase. Mainly simplicity, clinical nature are the most important requirements for any classification system. In the existing they used different machine learning techniques to detect only single disease. Whereas deep learning system, which is named as Convolutional neural networks (CNNs) can show hierarchical representing of images between disease eye and normal eye pattern.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134017971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Threshold-based flight data recorder analysis techniques have been widely used across the aerospace industry for fault detection and accident prevention. These techniques can detect pre-programmed events but fail to capture unknown patterns in the dataset. This research proposes a machine learning (ML) algorithm to analyze and detect unusual aero engine performance of a turboshaft engine mounted on a single engine rotorcraft. The performance is first modelled from an FDR dataset consisting of hundred flights, using least squares regression (LSR). A technique to scale the model by adding flight data from subsequent flights is thereafter discussed. Spectral Clustering is used for testing and validating the hypothesis derived from the regression model, by employing synthetically generated FDR data for twenty-five flights.
{"title":"Aero Engine Performance Monitoring Using Least Squares Regression and Spectral Clustering","authors":"Kunaal Saxena, M. Nene","doi":"10.3233/apc210217","DOIUrl":"https://doi.org/10.3233/apc210217","url":null,"abstract":"Threshold-based flight data recorder analysis techniques have been widely used across the aerospace industry for fault detection and accident prevention. These techniques can detect pre-programmed events but fail to capture unknown patterns in the dataset. This research proposes a machine learning (ML) algorithm to analyze and detect unusual aero engine performance of a turboshaft engine mounted on a single engine rotorcraft. The performance is first modelled from an FDR dataset consisting of hundred flights, using least squares regression (LSR). A technique to scale the model by adding flight data from subsequent flights is thereafter discussed. Spectral Clustering is used for testing and validating the hypothesis derived from the regression model, by employing synthetically generated FDR data for twenty-five flights.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134209106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zalte S. S, Patil P. N, Deshmukh S. N, Patil M. G, Dr. Pallavi Katkar
In this tech world, size of block chain is exponentially growing in this covid pandemic year which was not predicted. This pandemic environment causes digital transformation drive in various areas, particularly via the utilization of block chain or distributed ledger technology. To enhance and accelerate business process in various organization and industry showed a growing interest to adopt this technology. This paper summarized various block chain applications which are widely used in number of sectors and also focus on some challenges becomes hurdle while adopting block chain technology.
{"title":"Blockchain Technology: Rising Trend in Various Applications","authors":"Zalte S. S, Patil P. N, Deshmukh S. N, Patil M. G, Dr. Pallavi Katkar","doi":"10.3233/apc210228","DOIUrl":"https://doi.org/10.3233/apc210228","url":null,"abstract":"In this tech world, size of block chain is exponentially growing in this covid pandemic year which was not predicted. This pandemic environment causes digital transformation drive in various areas, particularly via the utilization of block chain or distributed ledger technology. To enhance and accelerate business process in various organization and industry showed a growing interest to adopt this technology. This paper summarized various block chain applications which are widely used in number of sectors and also focus on some challenges becomes hurdle while adopting block chain technology.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133362106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The internet is faced with many problems daily, one of them is decrement in network bandwidth because of Distributed Denial of Service (DDoS) attack on host server, which deplete host resources. Researchers has been invented many protection mechanisms such as detection, trace back, prevention, reaction, and characterization are in case of DDoS attacks, which will control the number of malicious packets received by the victim. But it does not provide efficient detection technique with high rate in real time network infrastructure. Thus, modern technologies are prepared on Mininet network simulators, which give more impact to simulate the real network. The architecture of Software Defined Networks (SDN) and OpenFlow architecture is used to demonstrate a programmable network model and centralized management of real network. In this research work, we provide design of software defined network (SDN) using mininet simulator and security issues related to the Software Defined Network.
{"title":"Study on SDN with Security Issues Using Mininet","authors":"Florance G, R. Anandhi","doi":"10.3233/apc210186","DOIUrl":"https://doi.org/10.3233/apc210186","url":null,"abstract":"The internet is faced with many problems daily, one of them is decrement in network bandwidth because of Distributed Denial of Service (DDoS) attack on host server, which deplete host resources. Researchers has been invented many protection mechanisms such as detection, trace back, prevention, reaction, and characterization are in case of DDoS attacks, which will control the number of malicious packets received by the victim. But it does not provide efficient detection technique with high rate in real time network infrastructure. Thus, modern technologies are prepared on Mininet network simulators, which give more impact to simulate the real network. The architecture of Software Defined Networks (SDN) and OpenFlow architecture is used to demonstrate a programmable network model and centralized management of real network. In this research work, we provide design of software defined network (SDN) using mininet simulator and security issues related to the Software Defined Network.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114468487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bharati H Naikwadi, K. Kharade, S. Yuvaraj, K. Vengatesan
Blockchain technology could radically transform our business environment in the decades to come. It has the power to redefine our views of business processes and may even impact our overall economy. The works comprehensively document the implementation of blockchain applications in various sectors. Our goal is to determine what state blockchain technology is in and what kinds of applications it has. A large majority of the current blockchain-related research is dedicated to crypto currencies, such as Bitcoin. Only a small percentage of work is dedicated to exploring the wide range of potential blockchain technology applications. Blockchain technology has multiple applications across multiple industries. This study attempts to determine the opportunities and threats presented by Blockchain Technology for current or future applications. The number of published studies that were studied carefully and critically and added to the Block chain’s body of knowledge was large.
{"title":"A Systematic Review of Blockchain Technology and Its Applications","authors":"Bharati H Naikwadi, K. Kharade, S. Yuvaraj, K. Vengatesan","doi":"10.3233/apc210230","DOIUrl":"https://doi.org/10.3233/apc210230","url":null,"abstract":"Blockchain technology could radically transform our business environment in the decades to come. It has the power to redefine our views of business processes and may even impact our overall economy. The works comprehensively document the implementation of blockchain applications in various sectors. Our goal is to determine what state blockchain technology is in and what kinds of applications it has. A large majority of the current blockchain-related research is dedicated to crypto currencies, such as Bitcoin. Only a small percentage of work is dedicated to exploring the wide range of potential blockchain technology applications. Blockchain technology has multiple applications across multiple industries. This study attempts to determine the opportunities and threats presented by Blockchain Technology for current or future applications. The number of published studies that were studied carefully and critically and added to the Block chain’s body of knowledge was large.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121596498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Sanjjey, S. Abisheak, T. Dineshkumar, M. Kirthan, S. Sivasaravanababu
This work advances the state-of-art secured WBAN system and QR pattern enabled authentication for privacy measures. An attempt was made to integrate all the above process to build high performance WBAN system. In this work, a comprehensive statistical framework is developed with randomized key generation and secured cipher transformation for secured sensor node communication. We create primary colour channels based on three different QR codes that are widely used for colour printing and complementary channels for capturing colour images. Last but not least, we produced a colour QR pattern.
{"title":"Highly Secured Dynamic Color QR Pattern Generation for Real Time Application","authors":"R. Sanjjey, S. Abisheak, T. Dineshkumar, M. Kirthan, S. Sivasaravanababu","doi":"10.3233/apc210290","DOIUrl":"https://doi.org/10.3233/apc210290","url":null,"abstract":"This work advances the state-of-art secured WBAN system and QR pattern enabled authentication for privacy measures. An attempt was made to integrate all the above process to build high performance WBAN system. In this work, a comprehensive statistical framework is developed with randomized key generation and secured cipher transformation for secured sensor node communication. We create primary colour channels based on three different QR codes that are widely used for colour printing and complementary channels for capturing colour images. Last but not least, we produced a colour QR pattern.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115999838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Greywater reuse furthermore, reusing can be an incredible method to get non-consumable water. Since it contains broke down pollutions, greywater can’t be utilized straightforwardly. As an outcome, it is critical to decide the nature of water prior to utilizing it. Body estimations require five days to finish, while COD estimations require only a couple of hours. Not exclusively improve models for evaluating water quality are required; however, a more coordinated methodology is additionally getting more normal. Most of these models require a wide scope of information that isn’t in every case promptly available, making it a costly and tedious activity. Because of different issues in the enlistment with estimation included in water quality boundaries like BOD as well as COD, the principal objective of this investigation is to track down the best multivariate direct relapse models for foreseeing complex water quality outcomes. The code was written in Python for multi-variable information sources, and a Linear Regression Model was created. The projected COD versus estimated COD chart shows that the noticed and expected qualities are practically the same. The R-squared worth was 0.9973. A plot of extended BOD as an element of COD is likewise remembered for the outcome.
{"title":"Predicting COD and BOD Parameters of Greywater Using Multivariate Linear Regression","authors":"Samir Sadik Shaikh, Rekha Shahapurkar","doi":"10.3233/apc210199","DOIUrl":"https://doi.org/10.3233/apc210199","url":null,"abstract":"Greywater reuse furthermore, reusing can be an incredible method to get non-consumable water. Since it contains broke down pollutions, greywater can’t be utilized straightforwardly. As an outcome, it is critical to decide the nature of water prior to utilizing it. Body estimations require five days to finish, while COD estimations require only a couple of hours. Not exclusively improve models for evaluating water quality are required; however, a more coordinated methodology is additionally getting more normal. Most of these models require a wide scope of information that isn’t in every case promptly available, making it a costly and tedious activity. Because of different issues in the enlistment with estimation included in water quality boundaries like BOD as well as COD, the principal objective of this investigation is to track down the best multivariate direct relapse models for foreseeing complex water quality outcomes. The code was written in Python for multi-variable information sources, and a Linear Regression Model was created. The projected COD versus estimated COD chart shows that the noticed and expected qualities are practically the same. The R-squared worth was 0.9973. A plot of extended BOD as an element of COD is likewise remembered for the outcome.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120916527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Source code summarization is the methodology of generating the description from the source code. The summary of the source code gives the brief idea of the functionality performed by the source code. Summary of the code is always necessary for software maintenance. Summaries are not only beneficial for software maintenance but also for code categorization and retrieval. Generation of summary in an automated fashion instead of manual intervention can save the time and efforts. Artificial Intelligence is a very popular branch in the field of computer science that demonstrates machine intelligence and covers a wide range of applications. This paper focuses on the use of Artificial Intelligence for source code summarization. Natural Language Processing (NLP) and Machine Learning (ML) are considered to be the subsets of Artificial Intelligence. Thus, this paper presents a critical review of various NLP and ML techniques implemented so far for generating summaries from the source code and points out research challenges in this field.
{"title":"Using Artificial Intelligence in Source Code Summarization: A Review","authors":"Shraddha Birari, S. Bhingarkar","doi":"10.3233/apc210203","DOIUrl":"https://doi.org/10.3233/apc210203","url":null,"abstract":"Source code summarization is the methodology of generating the description from the source code. The summary of the source code gives the brief idea of the functionality performed by the source code. Summary of the code is always necessary for software maintenance. Summaries are not only beneficial for software maintenance but also for code categorization and retrieval. Generation of summary in an automated fashion instead of manual intervention can save the time and efforts. Artificial Intelligence is a very popular branch in the field of computer science that demonstrates machine intelligence and covers a wide range of applications. This paper focuses on the use of Artificial Intelligence for source code summarization. Natural Language Processing (NLP) and Machine Learning (ML) are considered to be the subsets of Artificial Intelligence. Thus, this paper presents a critical review of various NLP and ML techniques implemented so far for generating summaries from the source code and points out research challenges in this field.","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126850532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}