Accepted Papers




Machine Learning for Road Traffic Accident Prediction

Sumit Gupta1 and Dr. Awadesh Kumar2, 1 Department of Computer Science, Institute of Science, BHU, India, 2 Department of Computer Science, MMV, BHU, India

ABSTRACT

Road safety and accidents have been big global concerns, and everyone is working to address the issue of road safety and accidents, which has been a big worry for many years. In every country on earth, there is traffic and reckless driving. This has a negative impact on a lot of pedestrians. They become victims, although having done nothing wrong. The number of traffic accidents is rising quickly due to the enormous increase in road cars. Accidents like these result in harm, impairment, and occasionally even fatalities. Numerous things like weather changes, sharp curves, and human error all contribute to the high number of traffic accidents. Road accidents result in serious but occasionally invisible injuries that subsequently have an impact on ones health. Using a machine learning system, this study seeks to analyse traffic incidents in order to anticipate and reduce.

KEYWORDS

Machine learning algorithm, Supervised Learning Feature Analysis, Road Accident.


Identification of Network Intrusions Using Decision Tree and Deep Learning for Detecting Anomalies

Dr. Garima Sinha1, Guru Sai Chandhan Madapakula2, Asritha Mudunuri3, Vishnu Vardhan Reddy G4, M S N S Vivek5 and Swetha Reddy Kadimetla6, 1Associate Professor, Department of Computer Science, JainUniversity, Bengaluru, India, 2B.Tech 4th year, Dept. of Computer Science, JainUniversity, Bengaluru, India, 3B.Tech 4th year, Dept. of Computer Science, JainUniversity, Bengaluru, India, 4B.Tech 4th year, Dept. of Computer Science, JainUniversity, Bengaluru, India, 5B.Tech 4th year, Dept. of Computer Science, JainUniversity, Bengaluru, India, 6B.Tech 4th year, Dept. of Computer Science, JainUniversity, Bengaluru, India

ABSTRACT

In todays world, everything is done online. Without a network, the entire world would be unable to function. With the massive increase in the use of computer networks and the vastly increased variety of applications they currently support, network security issues are increasing, since all systems suffer from security vulnerabilities which might increase attacks that could negatively impact the economy. As a result, detecting vulnerabilities in the network system has become more important, and it must be done as precisely as possible in real-time. Here we will create and train a model that uses the Decision Tree classifier to detect whether a network packet is being attacked. The NIDS is intended to monitor the whole network. It has visibility into all network flow and By considering both the metadata and packet content, a more comprehensive perspective can be obtained, allowing for a greater understanding of the context and enabling the identification of more widespread security threats. The addition of anomaly detection to NIDS through the use of deep learning algorithms improves the systems ability to detect intrusions.

KEYWORDS

Network IDS, Decision Tree, Anova F-Test, Recursive Feature Selection, Matlab.


I-mask: Mask With Integrated Monitoring System

Kartikeya Kushwaha, Mihir Sharma, Parth Bansal, Dept of ECE, ABES Engineering College, Ghaziabad, Uttar Pradesh, India

ABSTRACT

The main purpose and concept of this idea is to create an integrated monitoring system attachable to a wearable mask in order to monitor real time health related parameters such as body temperature, blood saturation level, blood pressure and heart rate. This IoT enable mask collected data from the sensor inbuilt in the mask and send these data to the central monitoring system for the display and monitoring. A power management system is also required for to reduce power consumption of the device. This I-Mask system reduce man power requirement of the hospital and better patient management and monitoring with extra level of care to the patient.

KEYWORDS

IoT, Mask, Personal Health, Sensors, Arduino, Blink app.


Encryption of Images on Iot: a Performance Analysis of Aes and Chacha20

Nasar Al Siyabi, University of Reading, Reading, UK

ABSTRACT

In this paper, we compare the performance of Advanced Encryption Standard (AES) and Chacha20. We used images for the performance analysis and computed 1) correlation, 2) histogram, 3) entropy, and 4) mean-square error (MSE) for comparing the two schemes. We also compared the execution times of both schemes. We used all three key sizes, 128 bits, 192 bits and 256 bits, for AES. Our results show that AES192 outperforms Chacha20 as well as AES128 and AES256.

KEYWORDS

IoT, AES, ChaCha20, correlation, entropy, MSE.


Blockchain Based Enterprise Application for Land Registration

Pratham Vats, Himanshu Singh and Nakul Jain, Amity School of Engineering and Technology , AMITY University , India

ABSTRACT

The current Land Registration System makes transferring property ownership in connection with a land purchase a time-consuming process. Because all of the countrys data is kept in one location, there are security concerns as well. In some instances, faulty or insufficient registration results in land litigation and ownership disputes. In this study, a blockchain-based land registration system is designed to get around the land registration systems stated restrictions. Block-level data storage that is decentralised in order to prevent land ownership issues, chain offers security and allows for the safe storage of landowner data.As land is a valuable asset, using block chain technology can considerably improve this sector s work implementation and characteristics for a smooth and hassle-free work flow to establish a trustworthy system. A governance systems essential department for storing records of land ownership is the land written record system. There are several flaws in the current system that cause conflict and corruption. A significant number of Courts and significant government resources enforcement organisations are addressing these issues.The use of blockchain technology could prevent these omissions and list the issues relating to land written record system, such as record tempering, Mercantilism of a consistent plot of property to a single purchaser. Land register is a system that keeps track of the primary claims to ownership made by various governmental entities, i.e., it keeps track of land possession records. However, there are several issues and flaws in the current system that contribute to corruption and disputes. In order to solve these issues, we frequently use Blockchain technology.Blockchain is used to counter these loopholes. It is used to find out the problems connected with land register system like tempering of records & commerce of identical piece of land to quite one vendee. The term "land register system" refers to the system that keeps track of the primary areas of possession that various governmental entities claim. The hold on record will be utilised as the evidence for the claim in order to prevent any potential fraud and ensure smooth transitions as needed.

KEYWORDS

SHA-256 Algorithm , Decentralized Ledger , Private Key Encryption.


Land Registration System Using Blockchain

Priyesh Raj Singh, Prateek Kumar, Niranjan Singh,Department Of Information Technology Galgotias College Of Engineering And Technology ,Uttar Pradesh, India

ABSTRACT

Land administration system is important for the management, allocation, and handling related to land, affecting a wide range of stakeholders. However, one of the biggest challenges in land administration systems is maintaining the accuracy of the data stored within them. Inaccuracies can arise from a variety of factors such as errors in data collection, processing, and misuse. These inaccuracies can lead to issues such as data tampering, lengthy registration times for transactions, and the potential for double-spending, all of which can undermine the integrity of the land administration system. To address these challenges, this research paper proposes the use of blockchain technology, specifically the blockchains contract written in the Solidity programming language. The smart contract is written in the main logic of the implementation. These contracts are logical implementations to determine the owner, seller, and the transfer of the land. The proposed solution uses a distributed ledger system to ensure the accuracy of data in the land administration system. The system verifies the users record through government officials and assigns a unique hash value to each submitted block of data. When a transaction for the transfer of ownership is initiated, a separate block is created with a unique hash value that is connected to the previous value, creating a sequence of blocks that are chained together. The hashing algorithm employed generates a fixed-size message digest, where each hashed value uniquely represents a complete set of transactions contained in a specific block.

KEYWORDS

associated with this paper include blockchain, smart contract, Ethereum, hashing, public ledgers, cipher, chain linking, consensus protocol, cryptography, decentralized application, encryption, and digital signature. This research paper concludes that blockchain technology has the capability to address the challenges faced by land administration systems, and the proposed smart contract implementation can improve the accuracy and reliability of these systems, benefiting a broad variety of stakeholders. Results of our research indicate that by using blockchain we can improve efficiency, transparency, and security, and reduce fraud. The advantages of using blockchain in the land transactions system can eliminate of intermediaries, reduce transaction costs, and increase the speed of transactions. Furthermore, smart contracts in blockchain-based land registration systems could ensure that transactions are executed automatically once the conditions specified in the contract are met.


Data Privacy Protection and Security of Digital Twin in Healthcare Using Cloud Computing and Blockchain

Johnson Muungano, Department of Computer and Engineering,Jain (Deemed-to-be University), Bangalore, India

ABSTRACT

A digital twin is a technology that facilitates seamless data integration between physical and virtual machines on both sides. This article explores the challenges, applications, and technologies involved such as Artificial Intelligence (AI), the Internet of Things (IoT), and digital twins—health, education, automotive, aerospace, etc. Various industries are constantly looking for new technologies to benefit their industries. Digital twin technology has great potential to meet the needs of this industry. However, to increase the availability of digital twin data, it is vital to consider sharing data securely with other data users. To solve this problem, a digital twin data-sharing network model is proposed. This proposed network model uses cloud computing for efficient data sharing and blockchain for verification. A communication scheme is designed for the proposed model to ensure data privacy and security in wireless channels. To ensure the security of the proposed protocol, informal methods for security analysis and formal methods such as BAN logic and AVISPA simulation tools are used. The proposed protocol is compared with related protocols to demonstrate its applicability in a digital twin environment.

KEYWORDS

Digital twin (DT), Mutual authentication and key agreement, Blockchain, Healthcare, Data Owner (DO), Data User (DU), Cloud computing, BAN logic, AVISPA.