Proceedings of the 7th International Conference on Communications and Cyber Physical Engineering
ICCCE 2024, 28–29 Febuary, Hyderabad, India
- 2026
- Book
- Editors
- Amit Kumar
- Stefan Mozar
- Book Series
- Lecture Notes in Electrical Engineering
- Publisher
- Springer Nature Singapore
About this book
This book includes peer-reviewed high-quality articles presented at the 7th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2024), held on July 19 and 20, 2024, at G Narayanamma Institute of Technology & Science, Hyderabad, India. ICCCE is one of the most prestigious conferences conceptualized in the field of networking and communication technology offering in-depth information on the latest developments in voice, data, image, and multimedia. Discussing the latest developments in voice and data communication engineering, cyber-physical systems, network science, communication software, image, and multimedia processing research and applications, as well as communication technologies and other related technologies, it includes contributions from both academia and industry. This book is a valuable resource for scientists, research scholars, and PG students working to formulate their research ideas and find the future directions in these areas. Further, it serves as areference work to understand the latest engineering and technologies used by practicing engineers in the field of communication engineering.
Table of Contents
-
A Novel Approach of Superstore Sales Data by EDA and ARIMA
J. Bhoomika Reddy, N. Ashritha, Katiki Reddy Navya, V. Kakulapati, V. MonicaThis chapter delves into the critical role of accurate sales forecasting in retail, particularly for superstores. It highlights the importance of understanding product demand and consumer behavior to optimize inventory and operational efficiency. The study focuses on analyzing superstore sales data from 2014 to 2021, emphasizing the impact of external factors like social media and the COVID-19 pandemic on market trends. The research employs Exploratory Data Analysis (EDA) and the ARIMA model to forecast future sales, providing valuable insights into trends, seasonality, and anomalies. The methodology includes data collection, preprocessing, EDA, model selection, and evaluation using metrics like MAE, MSE, RMSE, and MAPE. The study concludes that accurate forecasting can significantly enhance business decision-making, inventory management, and overall operational efficiency. The findings underscore the importance of periodic model review and adjustment to maintain accuracy. Future enhancements could involve incorporating external variables and advanced computational techniques to further refine sales forecasting.AI Generated
This summary of the content was generated with the help of AI.
AbstractThis study uses TS (time series) analysis techniques to create accurate forecasting models and insights using historical sales data from a superstore. The dataset's comprehensive coverage allows for the identification of trends, seasonality, and other temporal patterns. The research employs two well-known approaches, ARIMA and Prophet, to apply these techniques to Superstore sales data. TS data is widely used in various industries, including retail, and is essential for efficient inventory control, resource distribution, and tactical decision-making. The research utilizes data mining methods to identify basics and seasonal trends in past sales data, then uses ML (machine learning) algorithms, including Prophet and ARIMA (Auto-Regressive Integrated Moving Average) models, to forecast projected sales. The outcome enhances our understanding of TS analysis and forecasting techniques and helps optimize Superstore operations. ARIMA and Prophet demonstrate their ability to capture complex sales data dynamics, providing valuable insights for companies in a fast-paced, dynamic setting. -
AI-Enabled Facial Redesign: Crafting Personal Features with Generative Adversarial Networks
Sunil Bhutada, V. Kakulapati, K. Goutham, P. Nandith, Gulab SinghThis chapter delves into the groundbreaking advancements in AI-enabled facial redesign, focusing on the use of Generative Adversarial Networks (GANs) to craft personalized facial features with remarkable realism. The text explores the technical aspects of GANs, including the dual-attention mechanism and the use of controlled GANs to address challenges such as posture and lighting disparities. It also examines the potential applications of AI-enabled facial redesign in various domains, from cosmetic surgery simulations to forensic science. The chapter highlights the ethical considerations and privacy concerns associated with this technology, emphasizing the importance of responsible development and regulation. Additionally, it reviews existing works in the field, providing a comprehensive overview of the current state of research. The proposed methodology outlines the steps for implementing AI-enabled facial redesign, including data collection, model selection, and evaluation metrics. The chapter concludes with a discussion on the future enhancements and the potential societal impacts of this technology, offering a holistic perspective on the transformative potential of AI-enabled facial redesign.AI Generated
This summary of the content was generated with the help of AI.
AbstractThe abstract for the topic “AI-enabled Facial Redesign: Crafting Personal Features with Generative Adversarial Networks” is as follows: This research explores the connection of AI (artificial intelligence) and facial redesign through the application of Generative Adversarial Networks (GANs). GANs have developed as powerful tools in image generation, empowering the creation of genuine and personalized facial features. The study focuses on the development of an AI-driven framework capable of crafting individualized facial features, allowing users to redesign and customize their appearance in a digital space. The proposed system leverages deep learning techniques to understand and replicate facial characteristics, enabling users to experiment with diverse visual identities. Through the iterative process of GANs, the model refines its ability to generate realistic facial features, ensuring a seamless integration of personalized elements. This research not only addresses the technical challenges associated with AI-enabled facial redesign but also considers ethical implications, privacy concerns, and potential societal impacts. The outcomes of this study hold promise for various applications, ranging from virtual avatars and entertainment to cosmetic simulation and identity exploration. By pushing the boundaries of AI in reshaping personal features, this research contributes to the ongoing discourse on the accountable and innovative usage of AI in the field of facial modification. -
A Novel Approach for Recognizing and Eliminating Escalation Attack Using AI Techniques
Banoth Suman, Panga Saikiran, Nagelli Kasim, V. Kakulapati, M. Swapana KamakshiThis chapter explores a novel approach for recognizing and eliminating escalation attacks using AI techniques, focusing on the security challenges in cloud computing environments. The study evaluates the performance of various machine learning algorithms, including Random Forest, AdaBoost, XGBoost, and LightGBM, in accurately classifying insider threats. The methodology involves data collection from CERT databases, preprocessing, feature selection, and the application of machine learning techniques. The results highlight the superior performance of the voting classifier, which combines predictions from multiple models, achieving the highest accuracy of 96.45%. The study also discusses the importance of data processing, feature selection, and the optimization of model parameters to enhance the effectiveness of threat detection. The findings suggest that the proposed approach can significantly improve the precision of identifying insider threats, providing a robust solution for enhancing cloud security.AI Generated
This summary of the content was generated with the help of AI.
AbstractThe recent exponential increase in attack frequency and complexity has led to significant cybersecurity issues arising from the development of smart products. Despite the significant advancements that cloud computing has brought to the business sector, the centralization of this technology may provide challenges when it comes to using dispersed services such as security systems. Valuable data breaches may occur because of the substantial volume of data sent between organizations and cloud service providers, whether intentionally or unintentionally. The malevolent insider poses a critical danger to the company due to their heightened access and increased opportunities to do substantial harm. Insiders have exclusive and authorized access to information and resources, unlike others who are not part of the group. This study presents a machine learning system that detects and categorizes insider threats. The system finds abnormal events that may indicate anomalies and security issues related to privilege escalation. Several researches have been conducted on the detection of abnormalities and vulnerabilities in network systems to identify security defects or risks related to privilege escalation. However, many investigations lack the accurate identification of the assaults. This research assesses the performance of four machine learning algorithms, namely RF (Random Forest), AB(AdaBoost), XGB(XGBoost), and LGB(LightGBM), in classifying insider attacks. The evaluation is conducted using a bespoke dataset derived from various files of the CERT dataset. The findings indicate that LGB exhibits the best level of accuracy, although other algorithms like RF or AB provide superior performance in some internal attack scenarios. Utilizing various machine learning algorithms may provide a more robust categorization for detecting numerous internal threats. -
Risk Analysis of Mental Health Using Chatbot Based on Text Detection Model
M. Nagaraju, V. Kakulapati, P. V. Vaishnavi, A. Neha, M. VaishnaviThis chapter delves into the transformative potential of chatbots in mental health care, focusing on risk analysis through advanced text detection models. It explores the global impact of mental health issues, the shortage of mental health professionals, and the role of AI in bridging this gap. The study highlights the use of Natural Language Processing (NLP) techniques and various machine learning algorithms like LSTM, Random Forest, SVM, and Neural Networks to analyze textual data from chatbot interactions. The methodology section provides a detailed overview of the development process, including the use of Python and Django for implementation. The discussion section addresses the ethical and technological challenges of using AI in mental health care, emphasizing the need for further research. The conclusion underscores the potential of these AI-driven systems to provide early diagnosis, tailored treatment, and continuous support, paving the way for more accessible and effective mental health care.AI Generated
This summary of the content was generated with the help of AI.
AbstractFor a healthy existence, medical treatment is highly vital. Psychological health problems are becoming more common, which makes it even more important to have good monitoring methods. The idea is to create a chatbot that can use artificial intelligence to investigate the problem and provide the information that is needed about it. Chatbots help individuals understand health diagnostics based on symptoms and provide them good health recommendations. They also make it easier for humans and computers to talk to each other. The proposed system intends to deliver ongoing and individualized mental health assessments, giving those who need help a proactive and easy-to-reach option. This chatbot system was made using machine learning (ML), natural language processing (NLP), and recurrent neural networks (RNN). The technology uses machine learning (ML) techniques to look at text data and find useful information from how people engage with the chatbot. Some of the most important features of the suggested mental health monitoring system include real-time sentiment analysis, mood identification, and the ability to find possible threat factors that might be affecting someone’s mental health. This system is part of the developing area of digital mental health therapies. It provides scalable and easy-to-use solutions to help with the rising mental health problems throughout the world. This method also lowers the chances of crises and improves general health. -
Unveiling the Potential of Deep Learning in Stock Market Forecasting: A Comparative Analysis
K. Sneha Reddy, Tanusha Meka, Hema Sreyalahari Karanam, Pallavi NookaThis chapter delves into the potential of deep learning models, particularly Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) networks, in forecasting stock market trends. It begins with an overview of stock analysis techniques, including fundamental and technical analysis, and the importance of key indicators in understanding market dynamics. The chapter then provides a detailed explanation of LSTM and GRU architectures, highlighting their unique features and mathematical models. Data pre-processing techniques, such as MinMax scaling, sequence creation, and data reshaping, are discussed to prepare the stock data for analysis. The chapter presents a comprehensive analysis of stock data from major companies like Google, Microsoft, Apple, and Amazon, using various visualizations such as histograms, box plots, scatter plots, and line graphs. It also explores the relationship between risk and expected returns, as well as data trends and seasonality. The core of the chapter focuses on stock data prediction using LSTM and GRU models, comparing their performance through various metrics. The results indicate that the GRU model outperforms the LSTM model in terms of evaluation metrics, making it a preferred choice for stock market forecasting. The chapter concludes by discussing the factors to consider when choosing between GRU and LSTM architectures, emphasizing the importance of processing capacity, interpretability, and predictive accuracy. This detailed comparison provides valuable insights into the effectiveness of deep learning models in stock market forecasting, making it a crucial read for professionals seeking to leverage these technologies for better investment decisions.AI Generated
This summary of the content was generated with the help of AI.
AbstractThis paper introduces an exhaustive methodology for analyzing and forecasting stock market trends by leveraging fundamental and technical analysis methods, combined with deep learning models. The dataset used encompasses real-time stock data from prominent companies such as Google, Microsoft, Apple, and Amazon, comprising stock attributes. Initially, the analysis delves into exploring the distribution and correlation between open and closed prices, offering insights into the market dynamics. Employing visualization techniques, we scrutinize the attributes across the datasets, with a specific focus on comparing high and close prices, elucidating potential patterns and trends. Furthermore, this project delves into uncovering underlying trends and seasonality within the dataset, providing invaluable insights for investors. Our methodology combines both fundamental and technical analysis to provide investors with the essential tools for making investment decisions. In the forthcoming sections, we will employ specialized RNN architectures, specifically Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) models, to forecast stock market behavior. By conducting a meticulous comparative analysis, we aim to elucidate the effectiveness of these models in predicting stock market trends. -
Design of Immersive Multi-level Parking
C. Harinatha Reddy, Y. V. Siva Reddy, A. Pradeep Kumar Yadav, T. Bramhananda Reddy, N. Ravi Sankara Reddy, G. Raghu RamThis chapter delves into the design of an immersive multi-level parking system, addressing the critical issue of space optimization in urban areas. The text highlights the use of advanced technologies such as Building Information Modeling (BIM), Virtual Reality (VR), and Twin Motion to create a realistic and efficient parking solution. It provides a detailed analysis of the structural elements, including slabs, beams, columns, and footings, and their design considerations. The chapter also discusses the methodology used for implementing the idea, including the use of Total Station for precise measurements and AutoCAD for detailed planning. Additionally, it showcases the proposed parking structure for GPRE College, demonstrating how existing parking areas can be optimally utilized to accommodate both two-wheelers and four-wheelers. The conclusion emphasizes the increased efficiency in space utilization and the aesthetic improvements brought about by the new system.AI Generated
This summary of the content was generated with the help of AI.
AbstractThis paper is focused on presenting an improved solution to address the parking issues faced by vehicle users. Specifically, the study examines a practical problem encountered by automobile users at G. Pulla Reddy Engineering College. Currently, the parking area only caters to two-wheelers despite having sufficient space available. Consequently, four-wheelers are struggling to find suitable parking spots within the college premises, leading to a disorderly situation. To this challenge, the study proposes the implementation of a multi-level parking structure to optimize the existing parking space. This solution aims to facilitate smooth traffic flow by accommodating both two and four-wheelers in a single location, eliminating the need for additional parking areas. The study encompasses the planning, analysis, design, and detailed layout of the multi-purpose parking facility. Furthermore, efforts are being made to enhance the visualization of this project through the utilization of advanced technologies such as Virtual Reality (VR). -
PV and Wind Integration of Microgrid Protection Scheme in Using Wavelet and Machine Learning
Ravi Kumar Goli, Ramakrishna Ganji, Madhulatha Bethala, Vijay Chukka, Gopi Chand GovathotiThis chapter explores the integration of solar and wind energy sources into microgrids, focusing on creating an efficient protection scheme. The study employs wavelet analysis and machine learning techniques to address various fault scenarios, ensuring the microgrid's safety and reliability. Key topics include the use of the biorthogonal 1.5 wavelet for signal analysis, the application of machine learning algorithms for fault detection and classification, and the examination of different fault types such as single line-to-ground and double line-to-ground faults. The research demonstrates how the proposed scheme effectively identifies, classifies, and locates faults in multiple zones, enhancing the overall stability and dependability of the power grid. The conclusion highlights the potential of the proposed method to improve microgrid performance and suggests future work to refine the algorithms and explore advanced wavelet functions.AI Generated
This summary of the content was generated with the help of AI.
AbstractMicrogrids that combine solar and wind energy are now widely employed in the power industry to improve electrical system dependability and lower structural losses. Our approach leverages wavelet transform (WT) to analyze fault transient signals using the Bior1.5 mother wavelet. It decomposes Waveforms into detailed measurement values, providing information about fault type and location. -
Development of GPS Controlled Solar Battery-Operated Self-navigating Vehicle
G. Prasad Acharya, A. Gnana Priya, R. Sreema Reddy, K. CharithaThis chapter explores the development of a GPS-controlled, solar battery-operated, self-navigating vehicle prototype. The system utilizes an Arduino development board and GPS module for autonomous navigation, with waypoints defining the path. Ultrasonic sensors ensure obstacle detection, enhancing safety. The vehicle is powered by solar energy, stored in a battery, making it eco-friendly. The text delves into the system architecture, workflow, and circuit implementation, providing a comprehensive overview of the prototype's design and functionality. The prototype's ability to navigate autonomously and its integration of renewable energy sources make it a notable advancement in autonomous vehicle technology. The chapter concludes with potential upgrades, such as integrating AI for full autonomy, highlighting the system's scalability and future applications.AI Generated
This summary of the content was generated with the help of AI.
AbstractAutonomous vehicles or driverless vehicles are rapidly becoming popular these days. The most common way of achieving it is designing a line follower robot. The proposed system intends to foster a self-navigating vehicle. The device is based on the Arduino development board as well as ultrasonic sensors that aid in obstacle detection, a GPS module for tracking and motor drivers to control the vehicle's movements. Also, solar panels/batteries incorporated in the system for powering up with renewable energy sources, thereby advancing the manageability and decreasing dependence on conventional power sources. The proposed self-navigating vehicle is guided by a specific method whereby waypoints are placed along the way. After reaching one of the waypoints, the vehicle takes the necessary turn accordingly. The prototype moves in a predefined path by making its own decisions of turning or halting if needed. Through the combination of these components and pondering the GPS powered solar battery; the autonomous vehicle can provide a comprehensive study of self- navigating technologies, sensors, and sustainable power sources. -
Automatic Motorcyclist Helmet Rule Violation Detection Using LIME or RNN and PNN
Sunil Bhutada, V. Kakulapati, Kariveda Pravalika Reddy, Gurram Dhanu Sree, Mantha AditiThis chapter explores the development of an advanced helmet detection system using machine learning techniques, specifically focusing on Probabilistic Neural Networks (PNN) and Recurrent Neural Networks (RNN). The research aims to address the critical issue of helmet non-compliance, which contributes to a significant number of fatalities and injuries in traffic accidents. The methodology involves a comprehensive data collection process, exploratory data analysis, and the implementation of various machine learning algorithms. The system's performance is evaluated using metrics such as accuracy, precision, recall, and F1-score, ensuring its reliability and effectiveness in real-world scenarios. The integration of ensemble learning methods enhances the system's ability to capture intricate features and sequential patterns relevant to helmet detection. The article also discusses the potential impact of the system on safety compliance and accident prevention, highlighting its transformative potential in ensuring public safety and well-being. The conclusion emphasizes the importance of leveraging advanced machine learning methodologies to promote safer environments and the future enhancements that could further elevate the system's effectiveness and versatility.AI Generated
This summary of the content was generated with the help of AI.
AbstractThe study Model for Helmet Detection using PNN (Probabilistic Neural Network) and RNN (Recurrent Neural Network) employs advanced neural network methodologies, specifically PNN and RNN, to enhance the accuracy of detecting helmets in images or videos. By leveraging ensemble learning techniques, including lime, the model combines the strengths of probabilistic and sequential data processing methods to improve predictive accuracy. Through lime integration during training, the model gains interpretability insights, aiding in understanding the complex decision-making process. This facilitates the identification of critical features contributing to helmet detection, guiding preprocessing steps such as image standardization and feature extraction. The individual PNN and RNN classifiers are trained on labeled image data, and lime analysis enhances their interpretability, shedding light on their decision processes. Performance assessment metrics like precision, recall, and F1-score are utilized to estimate the efficiency of the classifiers. By aggregating predictions from PNN and RNN, leveraging lime's interpretability, the model harnesses their collective intelligence to improve overall detection performance. This approach ensures robustness and reliability in detecting helmets, contributing to safety compliance monitoring and accident prevention in various environments. -
Generating Synthetic Images from Text Using RNN and BiLSTM
Subhani Shaik, V. Kakulapati, Gudur Sathwik Reddy, Thumma Manoj, T. BhargavThis chapter explores the innovative approach of generating synthetic images from textual descriptions using a combination of Recurrent Neural Networks (RNN) and Convolutional Neural Networks (CNN). The study delves into the architecture that integrates RNNs for processing sequential text data and CNNs for extracting image features, aiming to create visually coherent images that correspond to given textual descriptions. The methodology involves training the model on the Flickr Text and Image dataset, with a focus on data preprocessing, model training, and text-to-image generation. The implementation analysis highlights the effectiveness of the CNN-BiLSTM algorithm, achieving an accuracy of 68%. The discussion section addresses the challenges in text-to-image synthesis and suggests future enhancements, such as training on diverse datasets and incorporating multimodal models. The conclusion emphasizes the promising results of using RNN and CNN for synthetic image generation and its potential applications in various fields.AI Generated
This summary of the content was generated with the help of AI.
AbstractThe goal of this research is to develop a novel system that can generate synthetic images by using textual descriptions as input for RNNs (Recurrent Neural Networks) and Bi-LSTM (Bidirectional Long Short-Term Memory) networks. The approach seeks to bridge the semantic divide between natural language and visual material by acquiring knowledge of the complex connections between textual descriptions and related visual aspects. The bidirectional aspect of the Bi-LSTM model allows for the capturing of both forward and backward dependencies in the text, enabling full comprehension of the input description by considering both the context and long-term relationships. The model’s performance will be evaluated by rigorous tests on benchmark datasets, including criteria such as picture quality, variety, and conformance to the input description. This study has the potential to be used in computer graphics, virtual reality, and content development for several media platforms. The effective execution of this research has the potential to improve the capacity of AI systems to comprehend and convert human-generated textual descriptions into visually attractive and appropriately situated synthetic images. -
Human Body and Cloth Segmentation
Nagaratna P. Hegde, Sireesha Vikkurty, Sriperambuduri Vinay Kumar, Chintaboina Mallikarjun, Mudavath RevanthThis chapter delves into the world of human body and cloth segmentation, a critical area of research with wide-ranging applications. The text begins with an introduction to semantic segmentation and human parsing, highlighting their importance in various fields such as medical imaging, pedestrian detection, and self-driving cars. It then explores the U2Net architecture, a state-of-the-art deep learning model used for semantic segmentation. The chapter provides a detailed description of the LIP dataset, which is used to train and evaluate the model. The preprocessing techniques, including image resizing, normalization, and data augmentation, are discussed in detail. The text also covers the encoder-decoder structure of U2Net, with a focus on the DenseNet backend and the pyramid pooling module. The training and testing process is thoroughly explained, along with the evaluation parameters used to assess the model's performance. The results and discussion section provides insights into the model's accuracy and robustness. The chapter concludes with a look at the potential applications and future directions in the field of human body and cloth segmentation.AI Generated
This summary of the content was generated with the help of AI.
AbstractThis study explores the burgeoning field of human clothing detection in images through sophisticated deep-learning techniques. With humans prevalent in the majority of global imagery, accurately processing human-centric data is pivotal across diverse applications. Early research primarily focused on facial detection and localization, yet challenges persisted in recognizing nuanced features such as body clothing. Recent advancements have propelled automated human analysis into various domains, including medical diagnostics, sports analytics, entertainment, virtual fitting rooms, and fashion inventory management. The complexity of human clothing detection lies in the diverse shapes, styles, and variations inherent in attire. This study addresses this intricate task by employing image segmentation methodologies, targeting different modules such as upper body, lower body, and full-body coverage. Leveraging advanced deep learning architectures, notably the U2Net framework, our approach aims to achieve robust and precise segmentation of various clothing elements. By dissecting clothing components at a granular level, our methodology contributes to the broader landscape of computer vision, empowering applications with enhanced human-centric insights and functionalities. The accuracy is estimated to be at around 80%. -
Cyber Crime Detection Using Machine Learning
M. Jyothirmai, M. Jayalakshmi, C. Ahalya, L. Lakshmi Prasanna KumarThis chapter delves into the critical issue of cybercrime detection, highlighting the increasing threat posed by cybercriminals to individuals, businesses, and governments. It explores the evolution of cybercrime, from early isolated incidents to sophisticated, organized attacks, and the impact of these crimes on financial stability, reputation, and critical infrastructure. The text emphasizes the importance of effective cybercrime detection in protecting sensitive data, preventing financial losses, and maintaining regulatory compliance. It provides a comprehensive overview of various types of cybercrimes, including malware attacks, phishing, identity theft, and financial fraud, and discusses the current trends and challenges in cybercrime detection. The chapter also outlines the objectives of cybercrime detection, such as educational purposes, knowledge dissemination, methodological guidance, technical insights, and best practices. It highlights the significance of feature selection in enhancing the accuracy of machine learning models used for cybercrime detection. The results section demonstrates the high accuracy and precision of these models in distinguishing between benign and malicious activities. The conclusion underscores the importance of high-quality datasets and meticulous data cleaning processes in building resilient cybercrime detection systems. This chapter offers valuable insights and practical recommendations for professionals seeking to enhance their cybersecurity strategies and stay ahead of emerging threats.AI Generated
This summary of the content was generated with the help of AI.
AbstractThe abstract provides an overview of our project, which focuses on utilizing machine learning techniques to detect cybercrime. Strong techniques for recognising and reducing these risks are essential as cyber threats keep evolving. Our project uses cutting-edge machine learning algorithms to identify and categorize different kinds of cybercrime in an effort to address this challenge. An extensive analysis of the use of machine learning algorithms for cybercrime detection is presented in this paper.. Leveraging vast datasets of historical cyber incidents, machine learning models are trained to recognize patterns indicative of malicious activities. Various techniques such as supervised learning, unsupervised learning, and deep learning are explored to effectively identify anomalies and potential security threats. -
SmartGuard: Advanced Security System with YOLOv8
Vijayabhaskar Ch, V. Kakulapati, P. Devender Reddy, N. Manikanta Teja, J. Sri VardanThis chapter explores the integration of the SmartGuard security system with YOLOv8 for real-time object detection, enhancing surveillance capabilities. The text delves into the system's architecture, including its smart home features and automated door control, and evaluates its performance using metrics like accuracy, recall, and F1 score. It also discusses the implementation of an email alert system for proactive threat identification. The study concludes with potential future enhancements, such as incorporating infrared cameras and improving threat understanding. This comprehensive analysis provides insights into the system's efficiency and adaptability, making it a crucial read for professionals seeking to advance security measures.AI Generated
This summary of the content was generated with the help of AI.
AbstractSmartGuard: Advanced Security System with Ultralytics YOLOv8 is like a smart watchdog for enhanced security. It uses advanced computer vision to quickly spot potential threats in real-time. Using YOLOv8, it can detect things swiftly and accurately, reducing false alarms. It easily works with existing security setups, making it super handy. It sets off an email alert whenever it spots something unusual. In this work, use the YOLOv8 model to identify objects, and once it does, it shoots off an email alert. It’s a smart and simple way to make security systems more responsive and effective. It uses Ultralytics YOLOv8, like a special tool, to spot possible problems quickly and accurately. The study focuses on finding security problems right away, so it is like a quick response team for security incidents. And sends you an email alert with pictures when it sees something not normal, making it easy for you to know what is happening and who is coming. They work effectively by training the YOLOv8 model on datasets. Bounding boxes and class probabilities are predicted concurrently by YOLO (You Only Look Once), which divides the video input into a pattern of lines. Ultralytics, a deep learning library, simplifies the training and deployment processes. During training, YOLOv8 learns to recognize various objects within the dataset, adjusting its parameters to optimize accuracy. -
Comparative Study of Models in Sentiment Analysis
Nagaratna P. Hegde, Sireesha Vikkurty, Sriperambuduri Vinay Kumar, Amruth Devineni, Sanjana CherukuriThis chapter presents a comparative study of various sentiment analysis models, including BERT, XLNet, Naive Bayes, CNN, and Logistic Regression, using a dataset of 50,000 movie reviews from IMDb. The study evaluates each model's performance using metrics such as F1 score, accuracy, precision, and recall. Notably, the ensemble method, which combines predictions from multiple models, achieves the highest recall, demonstrating its strength in capturing a broader range of sentiment instances. The chapter also discusses future works, including increasing epochs, scaling dataset size, integrating advanced models, optimizing ensemble approaches, and deploying models for real-world applications. The results highlight the diversity in performance across different models and underscore the potential of ensemble techniques in achieving comprehensive sentiment analysis outcomes.AI Generated
This summary of the content was generated with the help of AI.
AbstractThis project explores sentiment analysis using few main distinct machine learning models: Logistic Regression, Convolutional Neural Network (CNN), Naive Bayes, BERT, and XLNET. We leverage the IMDb dataset from the Natural Language Toolkit (NLTK), where sentences are labelled as positive or negative, forming the foundation for our training and testing sets. Logistic Regression employs TF-IDF features for sentiment prediction, while the CNN model, constructed using Keras, tokenizes and pads text data for input. Simultaneously, a Multinomial Naive Bayes classifier is trained on TF-IDF features. Each model is evaluated rigorously using metrics such as F1 score, accuracy, precision, and recall. Additionally, we developed a voting ensemble method that uses the results of all these models to achieve superior evaluation metrics.Comparing these models offers valuable insights into their strengths and weaknesses within the realm of sentiment analysis. We present the results through a grouped bar graph, providing a clear visualization of their comparative performance.Practitioners can derive actionable insights from our work, aiding in informed decision-making regarding performance metrics based model selection. By using the well-established libraries such as scikit-learn and TensorFlow we can ensure the robustness and reliability of our implemented models. -
Intelligence Frameworks for Medical Image Analysis and Augmentation – A Review
S. Radhika, G. SharadaThis chapter delves into the cutting-edge realm of deep learning for medical image analysis, with a particular emphasis on lung disease diagnosis. It explores the evolution from traditional machine learning methods to advanced deep learning techniques, highlighting the role of convolutional neural networks (CNN) and recurrent neural networks (RNN) in enhancing diagnostic accuracy. The text reviews various state-of-the-art architectures such as Inception, ResNet, and DenseNet, and discusses their effectiveness in medical image processing. It also examines the use of hybrid learning models that combine CNN and RNN, which have shown promise in improving the classification and segmentation of medical images. The chapter further elaborates on data preprocessing, augmentation, and performance evaluation metrics, providing a comprehensive overview of the latest advancements in the field. Additionally, it discusses the practical applications of these techniques in healthcare, emphasizing their potential to revolutionize medical imaging and diagnosis.AI Generated
This summary of the content was generated with the help of AI.
AbstractGetting pictures of inside organs for therapeutic reasons, such identifying or researching disorders, is known as medical imaging. Deep CNN comeback and the availability of computing power are the main drivers behind this. Expertise in diagnosis may be achieved by physicians by using deep learning systems that can detect hidden patterns in photos. It is now the most successful technique for computer-assisted diagnosis, organ segmentation, cancer detection, and illness classification. Numerous deep learning techniques have been described for the analysis of medical pictures for different types of diagnosis. The work utilizing the contemporary cutting-edge deep learning approaches for medical image processing is reviewed in this publication. A summary of convolutional neural network-based medical imaging research efforts is presented at the outset of this survey. We discuss how popular pretrained models and RNN improve the performance of convolutional networks in our second part. Lastly, we aggregate the performance indicators of deep learning models concentrating on lung illness diagnosis for easier direct assessment. -
Field Oriented Control of PMSM for Flux Weakening Operation
B. Naga Swetha, R. Geshma Kumari, K. Sravani, B. HarshiniThis chapter delves into the implementation of field-oriented control (FOC) for permanent magnet synchronous motors (PMSMs) in variable speed drives, focusing on flux weakening operation. The text begins by highlighting the advantages of variable speed drives, including reduced power line disruptions and regulated starting current, which have led to their widespread adoption in industries. The core of the chapter revolves around the design and modeling of a PMSM drive system using FOC, with a particular emphasis on reducing torque and speed ripples through sinusoidal pulse width modulation in MATLAB Simulink. The chapter also explores the use of flux weakening techniques to achieve higher speeds beyond the rated value, discussing the mathematical representation of the system and the role of discrete voltage vectors in minimizing flux and torque fluctuations. Through experimental results and simulations, the chapter demonstrates the dynamic performance of the PMSM drive system, showcasing its ability to maintain stable speed and torque under varying load conditions. Additionally, the chapter compares different control strategies, such as direct torque control (DTC), and highlights the benefits of FOC in achieving precise speed and torque control. The conclusion underscores the growing popularity of PMSM drives due to their efficiency and cost-effectiveness, positioning them as a superior alternative to conventional induction motors. This chapter provides a comprehensive overview of FOC techniques and their practical applications, making it an essential read for professionals seeking to enhance the performance of PMSM drive systems.AI Generated
This summary of the content was generated with the help of AI.
AbstractAs a result of the commercialization of premium permanent magnet materials, several manufacturers have released a range of Permanent Magnet Synchronous Machines into the market. For applications requiring quick torque response and excellent efficiency and performance, permanent magnet synchronous motors (PMSM) are commonly utilized. Effective-performance motor control is characterized by smooth spinning over the motor's whole speed range, rapid acceleration and deceleration, and total torque control at zero speed. For PM Synchronous Motors, Vector Control Techniques are utilized to accomplish this kind of control. This control approach provides a stator vector perpendicular to the rotor magnets by controlling the stator current in this manner. In order for it to function similarly to a DC motor that is individually energized, which by nature has a quick dynamic reaction. Therefore, PMSMs are the ideal option for drive applications that call for quick and precise torque response, such as servo drives that replace DC motors because of their expense, size, and upkeep.Since the discovery of more lightweight and compact permanent magnet synchronous motors (PMSMs), these motors have been used as traction motors without the need for a gearbox. Because of its minimal heat generation, it can also be employed as a completely enclosed traction motor. Undersea vehicles are another significant use for PMSMs because of their minimal acoustic noise output.The machine generates torque that reaches a speed called base speed for a specific DC source voltage. No current will reach machine segments over base speed because the induced emf of the machine will be greater compared to the maximum input voltage. In order to prevent this, the flux between the air gaps connections are weakened, constraining the generated electromagnetic field to a value below the applied voltage. -
Interactive Data Mining with Machine Learning: User-Centric Approaches and Tools
Potlakayala Deepthi, Manchala Bhavani, Kasapaka RubenRaju, BommaReddy Sindhuja, Aluka Madhavi, Samala NandiniInteractive Data Mining with Machine Learning (IDM-ML) is transforming the way professionals analyze and interpret data. This chapter explores the synergy between human expertise and machine intelligence, emphasizing user-centric approaches that prioritize intuitive interfaces and graphical representations. Key topics include the integration of user interaction in the entire data mining process, from problem formulation to model interpretation, and the development of tools that cater to users with diverse backgrounds. The chapter also delves into the importance of interactive data exploration and visualization, feature selection and engineering, and model evaluation and validation. Additionally, it discusses the role of Human-in-the-Loop Machine Learning (HITL ML) in enhancing model interpretability and adaptability. The conclusion highlights the transformative potential of IDM-ML in reshaping the landscape of data mining and machine learning, making it more accessible, transparent, and user-friendly. Professionals will gain insights into practical tools and methodologies that can be applied across various domains, ultimately advancing the goal of creating effective machine learning solutions for complex decision-making scenarios.AI Generated
This summary of the content was generated with the help of AI.
AbstractInteractive Data Mining with Machine Learning (IDM-ML) embodies a collaborative paradigm where users actively participate in the data-driven decision-making process. This paper explores user-centric approaches and tools in IDM-ML, focusing on enhancing accessibility, interpretability, and adaptability of machine learning models. The methodology emphasizes user involvement from problem formulation to model interpretation, ensuring alignment with diverse user backgrounds. Intuitive interfaces and graphical tools facilitate user-friendly interactions, enabling domain experts to contribute meaningfully. Key aspects include iterative feedback loops, transparent model interpretability, and continuous adaptation to evolving user requirements. The paper presents an overview of tools designed for user-centric IDM-ML, emphasizing their role in bridging the gap between machine learning experts and end-users. The user-centric design philosophy contributes to the democratization of machine learning, making it a practical and valuable tool in real-world scenarios. -
Smartmeals: A Dual Approach of Localized Dietary Recommendations and Predictive Model for Combating Child Malnutrition
Tamminina Ammannamma, Vyjayanti Nandula, Ridhima Thakur, Saranya Gummireddy, Akshaya JuluriThis chapter explores the development and implementation of an online platform designed to address child malnutrition in rural India. The platform leverages machine learning to provide personalized meal plans based on user-specific data, including age, height, weight, and location. A key feature is the BMI predictor, which forecasts BMI changes over 30 days, helping users maintain a healthy weight. The platform also offers location-specific recipe recommendations using locally available and affordable ingredients, ensuring accessibility and cultural relevance. Additionally, it supports multiple languages and audio input, making it user-friendly for individuals with varying levels of education. The chapter concludes with a real-world example from Andhra Pradesh, demonstrating the platform's effectiveness in suggesting appropriate recipes and predicting BMI with an accuracy of 80.5%. This innovative approach not only addresses the root causes of malnutrition but also provides a sustainable and scalable solution for improving child health outcomes in resource-constrained settings.AI Generated
This summary of the content was generated with the help of AI.
AbstractMalnutrition is a condition that arises when a person's diet lacks essential nutrients. Around 390 million people worldwide are underweight, and 890 million adults are obese. The prevalence of obese children and adults is increasing in both rich and poor countries due to the affordability and accessibility of high-fat, high-sugar, and high-salt foods. At the same time, fresh fruits and vegetables, legumes, meat, and milk are often expensive or unavailable to many families, exacerbating the problem. Parents in rural India are uneducated about malnutrition and avoid medical visits due to financial constraints. The Body Mass Index (BMI) is a widely used statistic to evaluate malnutrition, particularly among children under the age of five. This research proposes a technique to combat malnutrition in rural India by developing a machine learning-powered web platform that assesses nutritional needs, provides tailored meal recommendations, and monitors progress all while ensuring accessibility for all types of users.
- Title
- Proceedings of the 7th International Conference on Communications and Cyber Physical Engineering
- Editors
-
Amit Kumar
Stefan Mozar
- Copyright Year
- 2026
- Publisher
- Springer Nature Singapore
- Electronic ISBN
- 978-981-9502-69-1
- Print ISBN
- 978-981-9502-68-4
- DOI
- https://doi.org/10.1007/978-981-95-0269-1
PDF files of this book have been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com.