Proceedings of the International Conference on Computational Innovations and Emerging Trends (ICCIET- 2024)

+ Advanced search
145 articles
Proceedings Article

Self-Improved Black Widow Algorithm for Cloud Load Balancing

Koppula Geeta, V. Kamakshi Prasad
Recently, cloud computing has emerged as a predominant technique in the realm of information technology. The increasing demand of cloud computing platform in terms of computing and data storage so that the cloud providers offers numerous data centers present at various locations across the world. These...
Proceedings Article

Crypto Currency Price Prediction on Ethereum Using Time Series Forecasting Models Arima and Facebook Prophet Models

Juvvala Sailaja, Kovvuri N. Bhargavi, G. L. Narasamba Vanguri, Nagireddi Suryakala, Srinivasulu Thiruveedula
Crypto currencies have emerged as a popular investment option in recent years, with Ethereum being one of the most prominent ones. Accurate price prediction of Ethereum can provide valuable insights to investors and traders for making informed decisions. In this study, we utilized two time series prediction...
Proceedings Article

An Innovative Application on Career Journey Eduprogressor

Polamuri Sahithi, Sreesailam Veera Babu, Thota Maheswari
In today's competitive environment, students need essential skills for opportunities, valuable career connections, and strategic career planning. Our paper proposes an innovative system, EduProgressor, to assist students in their career journey by connecting them with industry experts and facilitating...
Proceedings Article

Automatic Vehicle Detection and Alert System

Lalam Takurini Priyanka, Tankala Meghana, Polumahanthi Namratha Patnaik, Kurma Priya Sai Sri Chandini
In India 80% of the deaths are due to accidents so as to prevent this Vehicle-to-Vehicle Technology has come into existence. This V2V technology not only prevents accidents but also detects them. This V2V is a subset of ITS. V2V is vehicle-to-vehicle communication in which vehicles exchange information...
Proceedings Article

Multi-Layered classification of Plant diseases using AI approach

Medida Jayapal, Madduru Sambasivudu, Chiriki Usha, Mantri Gayatri, Potu Sai Manisha
The growth rate of an agricultural sector is related to its capacity for innovation, and vice versa. Our Analysis is focused to employ various deep learning models to create an efficient Plant Disease Detection and Classification Networks (PDDC-Net).Preprocessing is the process of standardizing dataset...
Proceedings Article

FinFET Technology based Low Power SRAM Cell Design for Embedded Memory

Jami Venkata Suman, Mamidipaka Hema, A. Swetha Priya, D. Raja Ramesh, Patna Syamala Devi, Subba Rao Polamuri
Computer systems rely heavily on cache memory because it offers a quicker and more effective means of accessing frequently used data. It serves as a buffer between the CPU (central processing unit) and main memory (RAM). Electronic devices’ energy use during standby or idle mode is referred to as standby...
Proceedings Article

Real Time Parking Intelligence

Rayudu Srinivas, Marisetti Maneela, Attili Sai Sree Teja, Koona Naveen, Gani Sai, Chukka Yaswanth
The effective management of parking has become an essential aspect of urban mobility due to the rapid urbanization and the increasing number of vehicles on the streets. This technical document introduces a Smart Parking intelligence (SPI) that aims to address the challenges associated with traditional...
Proceedings Article

FinFET based Design and Performance Evolution of Multiplexers

Jami Venkata Suman, Mamidipaka Hema, D. Raja Ramesh, A. Swetha Priya, G. Reddy Hemantha, Subba Rao Polamuri
A multiplexer is a combinational logic designed to switch one of multiple input lines to a single common output line. Multiplexer is used in various designs in Very Large Scale Integration and Digital Signal Processing applications. FinFETs are emerging transistors that can work in the nanometre range...
Proceedings Article

Automatic HR Recruitment System: A MultiStage Evaluation Approach

Sreerama Murthy Velaga, Sai Srikara Prabhas Satti, Sai Karthik Balivada, Harika Atta, Yaswanth Battula
In response to the challenges of identifying ideal candidates in the dynamic job market, this paper introduces an Automated HR Recruitment System utilizing Natural Language Processing (NLP) and machine learning algorithms. The system automates candidate assessments, ensuring efficiency and precision...
Proceedings Article

Streamlined Event Registration and Management With Live Streaming Integration

Sreerama Murthy Velaga, Ch. Bhargav Yaswanth, A. Aishwarya, K. Deekshit, I. Karun, K. Dinesh Reddy
The use of live streaming technology has brought about a considerable evolution in the notion of event management and registration procedures. A feature-rich web application called “Event registration management system with live streaming” was created to make managing events, registrations, and participant...
Proceedings Article

LSTM-Based Temporal Analysis of Nifty 50: Accuracy Dynamics across Varied Time Frames

Priyanka Dash, Jyotirmaya Mishra, Suresh Dara
Given the inherent noise and volatility in financial markets, accurate stock market price prediction is still a difficult task. In this work, the Investigation of Long Short-Term Memory (LSTM) models for stock price prediction in the face of varied levels of noise in various historical data time frames...
Proceedings Article

A Managed Access System Provider for Safe and Confirmable Fog-Cloud Computing

Jhansi Bharathi Madavarapu, Giribabu Sinnapolu, Shailaja Salagrama, Prasad Kalapala, K. Reddy Madhavi
This research introduces HPCS, a model for a clinical decision support system that makes use of private and public cloud computing. In order to reliably and safely track a patient's vitals, a fog server inside the HPCS architecture uses a basic data mining method. It is possible to securely send...
Proceedings Article

Traffic Classification Using Machine Learning Models in Electromagnetic Nano-Networks

Subba Rao Polamuri, V. S. Naıdu, D. V. Reddy, D. H. Sudha, B. Suphanı, K. V. N. Kumar
The proliferation of Nano-sensors linked to wireless electromagnetic Nano-networks has raised the volume of traffic in numerous ways, but it has also opened up a lot of new opportunities for the Internet of Nano-things. When a nano-network is linked to the Internet by micro or nano gateways, it becomes...
Proceedings Article

Automatic Method To Predict And Classify Cyber Hacking Breaches Using Deep Learning

K. Ramesh, T. V. Prasad, V. Krishna Kanth, V. Sarveswar, S. D. Abrar Ali, M. Vikas Reddy
Analyzing cyber incident datasets is crucial for enhancing our comprehension of the evolving cyber threat landscape. In present generation many cyber hacking breaches taking place. This Application, Examine diverse cyber-attacks and breaches, analyze the methods employed in these incidents, and explore...
Proceedings Article

Intra Student Surveillance System: Detection And Identifying Unauthorized Wandering

D. Sattibabu, Shaik Yacoob, P. Tanuja, B. Madhu Koushika, K. Veera Babu, Ch. Jeevan Kumar
A student monitoring system is an advanced method of preserving security and discipline in educational institutions, particularly during class hours. Students are observed during intracultural and tech fest events hosted by the institutions. Unauthorized student roaming in restricted areas can disrupt...
Proceedings Article

Group Face Recognition: Identifying and Tracking Multiple Individuals

M. Sri Durga, N. Leelavathy, K. Siva, B. V. N. Surya Prathap, K. Sudheer Babu, E. C. Alex Mondesir
This project introduces a real-time multiple face recognition and tracking system. It utilizes a lightweight yet powerful deep learning model for face Recognition, ensuring efficient performance. The system incorporates a robust tracking algorithm to maintain face identities across video frames, making...
Proceedings Article

Facial Recognition Reinvented: Deep Learning Based Security Alert System

T. Sridhar Reddy, B. Sujatha, V. G. V. Prasanna Kumar, P. Srihari, M. Devi Harshitha, B. Murali Manohar
The study focuses on unauthorized access, which signifies attack into a device or residence without the owner's consent. This research aims to address access issues through the enhancement of established devices. In the existing system, a combination of Convolutional Neural Network (CNN) was utilized,...
Proceedings Article

Machine Learning-Based Autonomous Physical Security Defences

Subba Rao Polamurı, Knvpsb Ramesh, K. D. Srıhıtha, M. Srıdevı, M. Sangeetha, A. Yv. M. Gurudatta
Nearly 50 billion linked devices by 2025 will make physical entry to the target system much easier for attackers. The proliferation of embedded devices in mission-critical infrastructure and industrial control systems, as well as the existence of the Internet of Battlefield Things (IoBT), heighten this...
Proceedings Article

Pavement Crack Detection and Classification using Deep Learning Techniques

Shaik Yacoob, B. Sindhu, M. A. Neha Nousheen, R. Varshitha, B. Ayyappa, K. Vamsi Babu
Ensuring road safety is a global priority, with the prompt identification of pavement cracks playing a crucial role in preventing accidents and minimizing infrastructure damage. This study introduces an innovative approach to enhance road safety by employing deep learning techniques for the automated...
Proceedings Article

Comparative Bitcoin Price Prediction Using Multiple Machine Learning Techniques

N. Gowri Sree Lakshmi, V. Ajaykumar, B. Ashish, K. Hemalatha, T. Manohar, V. Sivashankerreddy
The cryptocurrency market is known for its inherent volatility, making accurate predictions a challenging endeavor. In this research study, investigate the efficacy of logistic regression, support vector machines (SVM), decision trees and random forests for the task of Bitcoin price prediction. To address...
Proceedings Article

Sky Sage: Revolutionizing Airfare Prediction with Advanced Machine Learning Integration

S. Mohan Krishna, Ashok Koujalagi, B. Kedareswari, K. Sandya Reddy, M. D. Mahaboob Sharif, M. Chandra Raghava Reddy
When choosing a mode of transportation, people today prioritize comfort above all else, favoring air travel above buses and trains. This paper's predictive skills help to provide anticipatory information to match the changing needs of passengers. This study looks into flight cost prediction by identifying...
Proceedings Article

Lightweight authenticated key agreement scheme for Cloud-assisted Internet of Things

Bommepalli Narayana Reddy, B. Raja Koti
Internet of Things (IoTs) devices face power constraints, manufacturers increasingly focus on group communication for their applications. Such communication heavily relies on a dependable, efficient, and verifiable group secret key. Blockchain technology has the power to solve the problems because it...
Proceedings Article

Securing the IoT: A Machine Learning Approach to Cyber Threat Analysis

Jani Shaik, Mogasala Bhanu, Doddi Bhoomika, Burri Divya, Kornu Himasagar, Prof Ashok Patel
The rise of Internet of Things (IoT) devices [1] has brought about numerous conveniences, but it has also introduced security challenges, notably the alarming threat of botnets. These malicious networks can compromise a large number of devices, posing significant risks to privacy, data integrity, and...
Proceedings Article

Adversaries on ML Models: The Dark side of Learning

Sahithi Godavarthi, G. Venkateswara Rao
Today's technological trends are advancing to new levels and showing a diverse array of uses. One of these that has recently grown in prominence is machine learning. The ability of ML to analyze data, learn, make decisions and predictions made it the outstanding technology to be used in plentiful...
Proceedings Article

An analysis on Proficiency in Securing Cyber Physical Systems and current research directions

Preeti Prasada, Srinivas Prasad
Cyber Physical Systems are the talk of the trending globe today, also the security of CPSs in equally important. While CPS has become a part of our life; in form of a health monitoring implant, home automation or a self-driving car, and the advancing adversary attacks that could affect lives by attacking...
Proceedings Article

Diseases Detection in Cotton Faring Using Deep Learning

A. Mohan, P. Chiranjeevi, A. Krishna Mohan
The primary crop in the world is the cotton, it is widely grown. India's very important profit crops and fibers, the nation’s agricultural and industrial depend on cotton. It provides The Cotton fiber, a basic raw ingredient, to the cotton textile industry. In India, six million farmers rely on...
Proceedings Article

Automated Medical Image Classification for Disease Prognosis

R. Tamilkodi, V. Bala Sankar, D. Bhoomika Chowdary, D. Teja Usha Devi, D. Satya Devi, J. Sanjana, V. Mrudula
An interesting exploration challenge for computer vision experimenters is the automated classification of medical pictures, made possible by recent advances in imaging technology. Medical pictures need to be sorted into their proper categories, and a good classifier is essential for this. With our proposed...
Proceedings Article

A Hybrid Machine-Learning Ensemble For Real-Time 4.0 Systems Anomaly Detection

V. S. A. Chandramouli, B. Ganga Bhavani, S. Divyateja, P. Anitha, N. R. D. S. S. Srinivas, P. L. Kumar
Massive amounts of data are created and collected by data acquisition systems, including SCADA and embedded systems in industrial machines. The data may be analysed by AI algorithms to gain a better understanding of the process and identify any irregularities in the machines. This is a major benefit...
Proceedings Article

A New Approach to Facial Skin Analyzer

R. Tamilkodi, P. Kalyan Chakravarthy, P. Hemanth Kumar, A. V. Laksmi Narayana, A. Karthik, I. Ramabrahmam
This software delves deep into facial skin analysis, beginning with the capture of images. These images unveil intricate details like wrinkles, pores, spots, and texture, and the software meticulously quantifies these aspects. It then intelligently categorizes your skin, drawing comparisons with peers...
Proceedings Article

Enhancing IoT Security Through Anomaly Detection and Intrusion Prevention in Cyber-Physical System

R. Tamilkodi, N. Madhuri, N. Pavansai, D. Madhavi Sai Kasiratnam, K. Sri Manikanta Karthik, K. Venkata Naga Kiran
Cyber-attacks on cyber-physical systems can lead to severe consequences, jeopardizing the integrity, availability, and functionality of interconnected physical and digital components. Implications may include disruption of critical services, compromised safety, and potential economic losses. Existing...
Proceedings Article

Integration Challenges and Opportunities for Gate-All-Around FET (GAA FET) in Next-Generation Electronic Devices

Jami Venkata Suman, A. Swetha Priya, G. M. Anitha Priyadarshini, K. Krishnamraju, Akurathi Gangadhar, Mamidipaka Hema
In the rapidly advancing landscape of semiconductor technology, Gate-All-Around FET (GAA FET) stands as a promising innovation poised to redefine the capabilities of next-generation electronic devices. This paper investigates the integration challenges and potential opportunities associated with the...
Proceedings Article

Enhancing The Efficacy Of Several Deep Learning-Based Models For Identifying Brain Tumours From Magnetic Resonance Images

T. Priyanka, A. Priyanka, S. G. Bhavani, P. S. N. Sarupya, Y. Balayesu, K. P. S. Karthik
It is essential to classify brain MRI scans as soon as feasible in order to diagnose brain tumours. There are numerous diagnostic imaging modalities that can be used to identify brain tumours. MRI's high-quality picture production makes it a popular choice for this application. The development of...
Proceedings Article

Unmasking Deception Strategies For Attack Detection

V. Nivetha, R. Tamilkodi, Repaka Subbarao, Pitta Rupesh Sai Teja, Chinta Sowmya, Chamarthi Leela Sri Krishna Pavan Murthy
In light of the increasing complexity of digital security risks, This work aims to utilize machine learning algorithms, particularly Support Vector Machines (SVM) and Naive Bayes, to bolster the identification and mitigation of deceptive practices in digital environments. The utilization of SVM and Naive...
Proceedings Article

An Overview of Distributed Computing in the Cloud and BlockChain for Safeguarding the Healthcare Sector

Jhansi Bharathi Madavarapu, Shailaja Salagrama, Jami Venkata Suman, Subba Rao Polamuri, K. Reddy Madhavi, Shiva Kaleru
The need for patient-centered electronic records that can store and retrieve the myriad details of a patient’s medical history as documented during treatment has increased dramatically. These records are vital for future care, billing, or treatment. The distributed ledger technology known as Blockchain...
Proceedings Article

Innovative methods to apply on medical data for predicting Heart disease using Machine Learning approach

V. S. A. Chandramouli, P. Devabalan, A. D. Devi, D. Manoj, G. R. Kumar, B. Sandeep
Accurately predicting the onset of cardiovascular disease is one of the most pressing problems in modern medicine. Medical experts devote a great deal of time trying to pin down what's causing this. The goal of using several algorithms, including LR, KNN, SVM, GBC, and the GridSearchCVs, is to forecast...
Proceedings Article

Tetrad’s Cryptography Algorithm For Enhancing Data Security Along Side Lost Data Retrieval

P. Sriram Chandra, V. Bala Shankar, N. Venkatesh, P. Pushkal Ram Tej, B. S. N. Ganesh, T. Puruhuthika
TETRAD’S represents an exceptional cryptographic algorithm innovated by the authors, with the objective of enhancing the security of data. This algorithm employs matrix representations, XOR operations on binary strings, and customized functions to generate an S-box for encryption. In addition, the algorithm...
Proceedings Article

An Intelligent Approach to Increase the Performance of Threat Detection in IoT

R. Tamilkodi, V. Bala Sankar, Nersu Pavankumar, Potnuru Hemanth Kumar, Uggu Veera Gani Durga, Bokka Durga Pravallika
The ubiquitous use of IoT (Internet of Things) devices is on the increase. In order for an Internet of Things system to function, it includes all of the necessary hardware, software, networks, sensors, and other parts. The developers of these sensors and devices, however, often omitted details about...
Proceedings Article

Automated Data Driven Approach To Waste Management

Kopanati Shankar, Pentakota Divya Gowri, Tannieru Hema Vardhan, Mohammad Hafizunnisa, Matha Venkat Krishna Mohan, Nadipineni Venkata Siva Lokesh
This work follows a systematic approach based on the Software Development Life Cycle (SDLC) to design and develop a garbage collection application using TensorFlow Lite machine learning model in Java within the Android Studio environment. The application addresses waste management challenges by integrating...
Proceedings Article

Hybrid Posture Detection Framework: Connecting Deep Neural Networks and Machine Learning

N. Jeevana Jyothi, K. Lakshmi Devi, T. Praneetha, R. Annapurna, V. Siva, S. Naveen
Many researchers in the fields of artificial intelligence and human sensing have been attempting to find a solution to the issue of posture detection. Posture recognition for the purpose of remote geriatric health monitoring, including standing, sitting, and walking. Most recent research has used conventional...
Proceedings Article

Women Safety App to Detect Danger And Prevent Automatically Using Machine Learning

Kopanati Shankar, Siripurapu Chalice Prajwal, Vallem Govardhan Kumar, Penaganti Anusha, Relli Chandra Sekhara Kameswar, Sunkari Bhanu Prakashn
This work follows the Software Development Life Cycle (SDLC) to develop a women's safety application using Java within the Android Studio environment. The application integrates audio sensing, machine learning, cloud storage, and geolocation to address women's safety concerns. It utilizes audio...
Proceedings Article

Profile Imposter Detection On Instagram Using XGboost And SVM Algorithm

Shrija Madhu, Neeli Gowri Sreelakshmi, Gandham Roshitha Madhuri, Panapana Shanmukha, Dulla Venkata Rajesh, Yendluri Venkata Sai Bhanu
In today's world, everyone relies heavily on social media. The vast majority of individuals nowadays regularly use social media as their primary means of communication. Social networking site membership is growing exponentially every day, and many users are chatting with people across the world...
Proceedings Article

ECG-Based Driver's Pressure Location Utilizing Profound Exchange Learning And Fluffy Rationale Approaches

Gunamani Jena, P. Ramesh, Uma Kumari, V. Sravallika, K. S. P. Anjaneyulu, P. S. V. S. Srinivas
The stress experienced by drivers is modelled in this article utilising multiple pre-trained networks. Seven pre-trained networks were utilised to extract features from ECG-based scalogram images in order to automatically increase the detection performance: Google Net, DarkNet-53, ResNet-101, InceptionResNetV2,...
Proceedings Article

Signal Dependent Local Noise Removal Using Weiner Filter Decomposition

P. Nagarathna, Afreen Kubra, G. Tirumala Vasu, Deepti Raj, Anitha Suresh, Samreen Fiza
Image denoising finds applications in various fields like remote sensing, photography, biological imaging, astronomy etc. If image is corrupted with single source of noise, then a suitable denoising filter can be used. The major challenge associated with image denoising algorithms is denoising of image...
Proceedings Article

String Instrument Tuner using signal processing algorithms

V. Venkataramanan, Palak Koul, Pranali Kurani, Noopur Parmar
Advances in digital signal processing technology allow it to be used for ever wider operations. Developers will be challenged to take this processing dominance to the extreme in creating new uses and improving existing ones. Numerous ways to reuse signals and images are now available. Several conformations...
Proceedings Article

A Software Defined Network based Security Assessment

B. S. N. Murthy, T. V. L. Srinivas, Ch. S. S. Prabha, A. S. Digvijay, M. R. Babu, T. L. N. Pavan
The integration of cloud computing with the Internet of Things, or “cloud IoT,” has the ability to revolutionise numerous industries. While some companies are hesitant to implement such technologies because of security concerns, others choose to disregard such worries and instead integrate the Cloud...