Pub Date : 2022-11-19DOI: 10.1109/ASSIC55218.2022.10088349
E. N. V. Kumari, K. Swetha, Soleti Navya
Currently, an independent car's driving method is chosen based on external criteria (pedestrian crossings, road surfaces, etc.) without considering the car's interior state. “A Driving Decision Approach (DDS) Based on Machine Learning for an Autonomous Vehicle” predicts the proper approach for an autonomous vehicle by searching outside and inside factors. The DDS trains a genetic set of rules that develops an autonomous car's best use method using cloud-based sensor information. The proposed DDS with rules compares to Random Forest and MLP (multilayer perceptron set of rules). Precise DDS beats random forest and MLP. This study compared DDS to MLP and RF neural community models. The DDS had a 5% lower loss rate than conventional car gateways in the study, and it computed Revolutions per minute, speed, direction angle, and converting lanes 40% faster than the MLP and 22% faster than the RF neural networks. DDS provides sensor records to a genetic collection of rules, which chooses the most acceptable value for extra unique prediction.
{"title":"A Driving Decision Strategy (DDS) Based on Machine learning for an autonomous vehicle","authors":"E. N. V. Kumari, K. Swetha, Soleti Navya","doi":"10.1109/ASSIC55218.2022.10088349","DOIUrl":"https://doi.org/10.1109/ASSIC55218.2022.10088349","url":null,"abstract":"Currently, an independent car's driving method is chosen based on external criteria (pedestrian crossings, road surfaces, etc.) without considering the car's interior state. “A Driving Decision Approach (DDS) Based on Machine Learning for an Autonomous Vehicle” predicts the proper approach for an autonomous vehicle by searching outside and inside factors. The DDS trains a genetic set of rules that develops an autonomous car's best use method using cloud-based sensor information. The proposed DDS with rules compares to Random Forest and MLP (multilayer perceptron set of rules). Precise DDS beats random forest and MLP. This study compared DDS to MLP and RF neural community models. The DDS had a 5% lower loss rate than conventional car gateways in the study, and it computed Revolutions per minute, speed, direction angle, and converting lanes 40% faster than the MLP and 22% faster than the RF neural networks. DDS provides sensor records to a genetic collection of rules, which chooses the most acceptable value for extra unique prediction.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116100950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-19DOI: 10.1109/ASSIC55218.2022.10088376
V. N. Reddy, N. Shaik, P. Rao, S. Nyamatulla
One of the most common cancers, particularly among women, is breast cancer. Cancer that originates in the breast tissue is called breast cancer. Indications of bosom disease could remember a protuberance for the bosom. Fluid emerges from the nipple by changing shape and dimpling the skin. When cells in the breast begin to grow out of control, breast cancer develops. Through screening and precise identification of masses, microcalcifications, and structural bends, mammography is the most effective and reliable method for the early detection of breasttumors. Breast disease is the leading cause of death for women worldwide. It is evident that recognizing danger early can aid in the investigation of a woman's infection and significantly increase the likelihood of survival. To find an abnormality in mammogram images, this novel segmentation technique, which is based on Iterative algorithms like the Markov random field (MRF) model, is proposed here. This algorithm processes the label with the lowest energy for all iterations. A label and boundary MRF can have a highly compressed relation thanks to this approach.
{"title":"Breast Cancer Detection by Using Radient Based Algorithm on Mammogram Images","authors":"V. N. Reddy, N. Shaik, P. Rao, S. Nyamatulla","doi":"10.1109/ASSIC55218.2022.10088376","DOIUrl":"https://doi.org/10.1109/ASSIC55218.2022.10088376","url":null,"abstract":"One of the most common cancers, particularly among women, is breast cancer. Cancer that originates in the breast tissue is called breast cancer. Indications of bosom disease could remember a protuberance for the bosom. Fluid emerges from the nipple by changing shape and dimpling the skin. When cells in the breast begin to grow out of control, breast cancer develops. Through screening and precise identification of masses, microcalcifications, and structural bends, mammography is the most effective and reliable method for the early detection of breasttumors. Breast disease is the leading cause of death for women worldwide. It is evident that recognizing danger early can aid in the investigation of a woman's infection and significantly increase the likelihood of survival. To find an abnormality in mammogram images, this novel segmentation technique, which is based on Iterative algorithms like the Markov random field (MRF) model, is proposed here. This algorithm processes the label with the lowest energy for all iterations. A label and boundary MRF can have a highly compressed relation thanks to this approach.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115171599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-19DOI: 10.1109/ASSIC55218.2022.10088380
S. Naik, Mohammad Arshad
Malicious Web attacks hide behind normal data in irregular organization traffic. It causes internet frustration and obscurity, making it difficult for the Organization Access Framework to maintain identification accuracy and timing. This research examines machine learning and deep reading for unequal network traffic. First, utilise ENN to divide incomparable training sets into solid and simple sets. Next, use KMeans to compress a fancy set's samples to reduce degree. Focus and delete little samples from a nice set, then mix fresh samples to increase the minimal number. A simple set, a compressed set of heavy objects, and several hard sets were merged to produce a new training set. The technique lowers initial training set inconsistencies and improves data for younger students. It helps class dividers learn differences during training and improves design effectiveness. For testing, we used the old NSL-KDD website. We employ random field (RF) and VSM classification models (SVM). Our proposed DSSTE algorithm performs worse than 24 other techniques.
{"title":"Detection of Cyberattack in Network Using Machine Learning","authors":"S. Naik, Mohammad Arshad","doi":"10.1109/ASSIC55218.2022.10088380","DOIUrl":"https://doi.org/10.1109/ASSIC55218.2022.10088380","url":null,"abstract":"Malicious Web attacks hide behind normal data in irregular organization traffic. It causes internet frustration and obscurity, making it difficult for the Organization Access Framework to maintain identification accuracy and timing. This research examines machine learning and deep reading for unequal network traffic. First, utilise ENN to divide incomparable training sets into solid and simple sets. Next, use KMeans to compress a fancy set's samples to reduce degree. Focus and delete little samples from a nice set, then mix fresh samples to increase the minimal number. A simple set, a compressed set of heavy objects, and several hard sets were merged to produce a new training set. The technique lowers initial training set inconsistencies and improves data for younger students. It helps class dividers learn differences during training and improves design effectiveness. For testing, we used the old NSL-KDD website. We employ random field (RF) and VSM classification models (SVM). Our proposed DSSTE algorithm performs worse than 24 other techniques.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"3 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120909651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-19DOI: 10.1109/ASSIC55218.2022.10088305
Minakshi Roy, Akash Kumar Bhoi, Kalpana Sharma
One of the most important research fields in the recent digital era is student career prediction. Choosing a career is critical for college students in the planning phase of life. However, accurately forecasting their career choice is challenging because of the diversity of each person's aspirations and ideas. Traditionally, various survey methodologies have been used to forecast a student's future career. However, those methods take significant time to predict the result. In today's digitized world, various computational approaches are utilized to forecast outcomes in various domains. Using computing ideas such as Machine Learning (ML), students' professional choices can also be predicted. Compared to traditional procedures, it takes less time and yields better results. In this research paper, the prediction of the student's career is made using ADABOOST, Support Vector Machine (SVM), Random Forest (RF), and Decision Tree (DT) approaches. The dataset is trained and tested with the four algorithms, and it was observed that SVM had given maximum accuracy with 98 percent, and next to the ADABOOST with 88 percent accuracy.
{"title":"Multimodal Machine Learning approaches for Career Prediction","authors":"Minakshi Roy, Akash Kumar Bhoi, Kalpana Sharma","doi":"10.1109/ASSIC55218.2022.10088305","DOIUrl":"https://doi.org/10.1109/ASSIC55218.2022.10088305","url":null,"abstract":"One of the most important research fields in the recent digital era is student career prediction. Choosing a career is critical for college students in the planning phase of life. However, accurately forecasting their career choice is challenging because of the diversity of each person's aspirations and ideas. Traditionally, various survey methodologies have been used to forecast a student's future career. However, those methods take significant time to predict the result. In today's digitized world, various computational approaches are utilized to forecast outcomes in various domains. Using computing ideas such as Machine Learning (ML), students' professional choices can also be predicted. Compared to traditional procedures, it takes less time and yields better results. In this research paper, the prediction of the student's career is made using ADABOOST, Support Vector Machine (SVM), Random Forest (RF), and Decision Tree (DT) approaches. The dataset is trained and tested with the four algorithms, and it was observed that SVM had given maximum accuracy with 98 percent, and next to the ADABOOST with 88 percent accuracy.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121789404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-19DOI: 10.1109/ASSIC55218.2022.10088341
I. D. Muraina, Abdulwahab Folorunso Atanda, Abdulrauf Garba Sharifai, Usman Alhaji Abdurrahman, A. Umar
The benefits of digital transformation has largely been felt in almost every part of professions with inclusion of healthcare industry. Healthcare industry is known to be reached with pool of data which could be historical in nature, thus requires to be kept in a secured and reliable locations. Cloud platform has been used to make data and information available for the users in distributed locations, while many methods and approaches have been provided to preserve the sanctity of a platform. However, less or no study has been conducted on the use of hashing algorithm, which has been proven reliable in protecting the data in an online domain. The objective of this study is to explore the capacity of hashing algorithm towards securing the healthcare data repository in the cloud. The study designs a cloud-based procedural model in form of flowchart to protect the healthcare data repository by using the concept of hash algorithm as basis. Therefore, the model was validated and represented by Pseudocode which shows the reliability of the designed procedural model. Hence, the use of hashing algorithm in protecting the healthcare data repository would assist the healthcare industries in strengthening the curation of data in the cloud system.
{"title":"Protecting the Cloud-Based Healthcare Data Repository: Overview of Hashing Algorithm","authors":"I. D. Muraina, Abdulwahab Folorunso Atanda, Abdulrauf Garba Sharifai, Usman Alhaji Abdurrahman, A. Umar","doi":"10.1109/ASSIC55218.2022.10088341","DOIUrl":"https://doi.org/10.1109/ASSIC55218.2022.10088341","url":null,"abstract":"The benefits of digital transformation has largely been felt in almost every part of professions with inclusion of healthcare industry. Healthcare industry is known to be reached with pool of data which could be historical in nature, thus requires to be kept in a secured and reliable locations. Cloud platform has been used to make data and information available for the users in distributed locations, while many methods and approaches have been provided to preserve the sanctity of a platform. However, less or no study has been conducted on the use of hashing algorithm, which has been proven reliable in protecting the data in an online domain. The objective of this study is to explore the capacity of hashing algorithm towards securing the healthcare data repository in the cloud. The study designs a cloud-based procedural model in form of flowchart to protect the healthcare data repository by using the concept of hash algorithm as basis. Therefore, the model was validated and represented by Pseudocode which shows the reliability of the designed procedural model. Hence, the use of hashing algorithm in protecting the healthcare data repository would assist the healthcare industries in strengthening the curation of data in the cloud system.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127025811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-19DOI: 10.1109/ASSIC55218.2022.10088379
S. M, Vijaya Chandra Jadala, S. Pasupuleti, P. Yellamma
Cerebellar Ataxia disease (CA) is one of the neurological diseases that makes the critical health issues in affected patients. For this goal, disease prediction should closely study the premotor stage of Cerebellar Ataxia disease. A novel deep-learning algorithm is used to determine whether a person has Cerebellar Ataxia disease based on promoter traits. In addition to recognizing the CA, we also discuss the feature importance of the Boosting-based CA detection process. The research investigated many tests to detect CA, like Rapid Eye Movement and slow activity movements or wrong movements. The proposed research model is based on a collected dataset, including 195 patients with regular and affected persons. The different images are classified using the various movement factors. This research designed the ResNet50 model, which gives an average accuracy of 87.5%.
{"title":"Deep Learning analysis using ResNet for Early Detection of Cerebellar Ataxia Disease","authors":"S. M, Vijaya Chandra Jadala, S. Pasupuleti, P. Yellamma","doi":"10.1109/ASSIC55218.2022.10088379","DOIUrl":"https://doi.org/10.1109/ASSIC55218.2022.10088379","url":null,"abstract":"Cerebellar Ataxia disease (CA) is one of the neurological diseases that makes the critical health issues in affected patients. For this goal, disease prediction should closely study the premotor stage of Cerebellar Ataxia disease. A novel deep-learning algorithm is used to determine whether a person has Cerebellar Ataxia disease based on promoter traits. In addition to recognizing the CA, we also discuss the feature importance of the Boosting-based CA detection process. The research investigated many tests to detect CA, like Rapid Eye Movement and slow activity movements or wrong movements. The proposed research model is based on a collected dataset, including 195 patients with regular and affected persons. The different images are classified using the various movement factors. This research designed the ResNet50 model, which gives an average accuracy of 87.5%.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127146210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-19DOI: 10.1109/ASSIC55218.2022.10088383
Sahasra Sai Tarun Mandiga, Sai Prabhath Mallavarapu, Jayanth Nayani, R. Mathi, Subramani R
International Diabetes Federation estimates put the number of diabetics in India at 50.8 million in 2010. and it is estimated to rise to 87.0 million by 2030. One of the most common problems associated with Type 2 diabetes is Retinopathy. Diabetic Retinopathy is a kind of visual loss that affects persons between the ages of 20 and 64. Diabetic Retinopathy puts pressure on the eyeball by shattering the natural flow of fluid out of the eye, harming nerves and leading to glaucoma. If it is detected and treated early, we can reduce the risk of visual loss. However, diagnoses by ophthalmologists involve time, effort, and money, and if computer-aided diagnosis techniques aren't used, misdiagnosis can occur. In recent times deep learning has become the most popular method for obtaining high performance in various fields, even in medical image analysis and classification. The purpose of this research is to anticipate diabetic Retinopathy beforehand in order to avoid future eye problems. The proposed deep learning architecture is based on the Mobile Net architecture, a mobile-friendly, lightweight design that was trained and tested on retinal fundus pictures from the Aptos 2019 challenge data set.
{"title":"Retinal Blindness Detection Due To Diabetes Using MobileNetV2 And SVM","authors":"Sahasra Sai Tarun Mandiga, Sai Prabhath Mallavarapu, Jayanth Nayani, R. Mathi, Subramani R","doi":"10.1109/ASSIC55218.2022.10088383","DOIUrl":"https://doi.org/10.1109/ASSIC55218.2022.10088383","url":null,"abstract":"International Diabetes Federation estimates put the number of diabetics in India at 50.8 million in 2010. and it is estimated to rise to 87.0 million by 2030. One of the most common problems associated with Type 2 diabetes is Retinopathy. Diabetic Retinopathy is a kind of visual loss that affects persons between the ages of 20 and 64. Diabetic Retinopathy puts pressure on the eyeball by shattering the natural flow of fluid out of the eye, harming nerves and leading to glaucoma. If it is detected and treated early, we can reduce the risk of visual loss. However, diagnoses by ophthalmologists involve time, effort, and money, and if computer-aided diagnosis techniques aren't used, misdiagnosis can occur. In recent times deep learning has become the most popular method for obtaining high performance in various fields, even in medical image analysis and classification. The purpose of this research is to anticipate diabetic Retinopathy beforehand in order to avoid future eye problems. The proposed deep learning architecture is based on the Mobile Net architecture, a mobile-friendly, lightweight design that was trained and tested on retinal fundus pictures from the Aptos 2019 challenge data set.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116589941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-19DOI: 10.1109/ASSIC55218.2022.10088324
V. Hema, A. Sangeetha, Soleti Navya, Ch. Nimisha Chowdary
A helmet is a protecting gear worn to guard the head from wounds and tears. A smart helmet can provide more protection by dividing its system into 3 parts: helmet circuit, automobile circuit and a message alert system. The helmet circuit has transmitter, impact switch, alcohol detection sensor and a button. The automobile circuit has arduino, GSM and GPS modules, buzzer system, receiver, relay. The helmet is worn or not segment is checked by sending message from helmet circuit to the automobile circuit. The auto mobile circuit verifies the status to begin the engine or not. Impact switch works to sense an abrupt force which helps to detect an accident. If accident is detected, message alert circuit sends the accident position automatically to the police and emergency contact number through GSM and GPS.
{"title":"Smart Helmet and Accident Identification System","authors":"V. Hema, A. Sangeetha, Soleti Navya, Ch. Nimisha Chowdary","doi":"10.1109/ASSIC55218.2022.10088324","DOIUrl":"https://doi.org/10.1109/ASSIC55218.2022.10088324","url":null,"abstract":"A helmet is a protecting gear worn to guard the head from wounds and tears. A smart helmet can provide more protection by dividing its system into 3 parts: helmet circuit, automobile circuit and a message alert system. The helmet circuit has transmitter, impact switch, alcohol detection sensor and a button. The automobile circuit has arduino, GSM and GPS modules, buzzer system, receiver, relay. The helmet is worn or not segment is checked by sending message from helmet circuit to the automobile circuit. The auto mobile circuit verifies the status to begin the engine or not. Impact switch works to sense an abrupt force which helps to detect an accident. If accident is detected, message alert circuit sends the accident position automatically to the police and emergency contact number through GSM and GPS.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133658438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-19DOI: 10.1109/ASSIC55218.2022.10088311
K. Maniraj, Kiran Dasari, B. Ravi, Pallavi Madamanchi, Meghana Lanka, B. Kumar
Technology makes cleaning more intelligent and accessible. Future energy sources will become saturated and run out. Instead of using nonrenewable energies, consider solar power. Today, practically every field uses solar energy. Cleaning is one household task that never becomes obsolete and welcomes new technology. Floors are cleaned with broomsticks, vacuum cleaners, and advanced robot cleaners like Roomba. Middle-age vacuum cleaners and even advanced robotic cleaners are too expensive for low and middle-class consumers. Traditional vacuum cleaners reduce the amount of human energy needed to clean floors, but the user must remain behind the machine to direct the suction pipe to dusty areas. These vacuum cleaners are likewise plugins, meaning they can only be used while plugged in. Solar energy is used to charge the battery, which powers the driving circuit. This cleaner uses Arduino-Uno and Motor driver L293D. This designed solar floor cleaner is driven autonomously with sensor communication by recognizing obstructions and avoiding them. Another Bluetooth module lets the user steer the cleaner to any desired area. This module accepts commands and drives the model. This household and outdoor cleaner provide easy and rapid cleaning. It avoids regular vacuum cleaners ‘plugin and use’ method by self-moving and cleaning concurrently. Thus, automated solar floor cleaners have efficient cleaning benefits and uses.
{"title":"Design of Automated Solar Floor Cleaner using IOT","authors":"K. Maniraj, Kiran Dasari, B. Ravi, Pallavi Madamanchi, Meghana Lanka, B. Kumar","doi":"10.1109/ASSIC55218.2022.10088311","DOIUrl":"https://doi.org/10.1109/ASSIC55218.2022.10088311","url":null,"abstract":"Technology makes cleaning more intelligent and accessible. Future energy sources will become saturated and run out. Instead of using nonrenewable energies, consider solar power. Today, practically every field uses solar energy. Cleaning is one household task that never becomes obsolete and welcomes new technology. Floors are cleaned with broomsticks, vacuum cleaners, and advanced robot cleaners like Roomba. Middle-age vacuum cleaners and even advanced robotic cleaners are too expensive for low and middle-class consumers. Traditional vacuum cleaners reduce the amount of human energy needed to clean floors, but the user must remain behind the machine to direct the suction pipe to dusty areas. These vacuum cleaners are likewise plugins, meaning they can only be used while plugged in. Solar energy is used to charge the battery, which powers the driving circuit. This cleaner uses Arduino-Uno and Motor driver L293D. This designed solar floor cleaner is driven autonomously with sensor communication by recognizing obstructions and avoiding them. Another Bluetooth module lets the user steer the cleaner to any desired area. This module accepts commands and drives the model. This household and outdoor cleaner provide easy and rapid cleaning. It avoids regular vacuum cleaners ‘plugin and use’ method by self-moving and cleaning concurrently. Thus, automated solar floor cleaners have efficient cleaning benefits and uses.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130261735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-19DOI: 10.1109/ASSIC55218.2022.10088355
Esha Jain
Artificial Intelligence is getting expanding consideration in the corporates and humanity. In banking, the principal practices of AI were operative; nonetheless, AI is essentially applied in speculation backend and banking administrations without client interaction. Presenting AI in business banking might modify commercial cycles and collaborations with clients, which might set out research and open doors for conducting finance. The current study focuses on challenges in applying artificial intelligence in the banking sector by following a scientometric assessment and showed that innovations drastically change the idea of work. It was also found that web application weaknesses are security openings, which aggressors might endeavor to take advantage of, henceforth possibly making genuine harm to business, like taking touchy information and compromising business assets. It was concluded from the study that since web applications are currently broadly utilized, basic business conditions, for example, web banking, correspondence of touchy information, and internet shopping require powerful defensive measures against a wide scope of weaknesses.
{"title":"Challenges In Applying Artificial Intelligence In Banking Sector: A Scientometric Review","authors":"Esha Jain","doi":"10.1109/ASSIC55218.2022.10088355","DOIUrl":"https://doi.org/10.1109/ASSIC55218.2022.10088355","url":null,"abstract":"Artificial Intelligence is getting expanding consideration in the corporates and humanity. In banking, the principal practices of AI were operative; nonetheless, AI is essentially applied in speculation backend and banking administrations without client interaction. Presenting AI in business banking might modify commercial cycles and collaborations with clients, which might set out research and open doors for conducting finance. The current study focuses on challenges in applying artificial intelligence in the banking sector by following a scientometric assessment and showed that innovations drastically change the idea of work. It was also found that web application weaknesses are security openings, which aggressors might endeavor to take advantage of, henceforth possibly making genuine harm to business, like taking touchy information and compromising business assets. It was concluded from the study that since web applications are currently broadly utilized, basic business conditions, for example, web banking, correspondence of touchy information, and internet shopping require powerful defensive measures against a wide scope of weaknesses.","PeriodicalId":441406,"journal":{"name":"2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131542402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}