Search all articles
2594 articles
Proceedings Article
IOT Based Automatic Ploughing, Seeding And Watering Robot
T. Santhi Vandana, K. Srinivasa Reddy, S. Nagireddy, Pydimarri Padmaja, P. Rashmitha, S. Vasishta, S. Abhinay Reddy, S. Anand Reddy
Agriculture is one of the long-established occupations across the globe. More than half of the population predominantly rely on agriculture as the primary occupation for their livelihood. Despite the advancement of technology farmers still follow traditional methods to carry out the tasks. The development...
Proceedings Article
Enhancing Financial Decision-Making: Tax Saving Recommendations and Fraud Detection Using XGBoost and Random Forest
Heer Dhandhukia, Aryan Dalvi, Sarthak Girish, Ankita Nagmote
Personalized tax optimization and fraud detection pose a challenge to financial decision-making due to the constraints of conventional methods. This research provides a composite machine learning framework combining XGBoost with SHAP for personalized tax- saving recommendations and Random Forest with...
Proceedings Article
Sab-Share: Enhancing Digital Affordability Through Collaborative Subscription Sharing
Chanchal Ahlawat, Avikumar Prajapati, Shivani Tufchi, Satvik Gupta
Subscription-based services have made digital platforms more accessible; their rapid rise comes with mixed blessings for users looking for low- cost deals. In this paper, we introduce Sab-Share, a web-based application that enables users to share subscriptions across different services, including OTT...
Proceedings Article
ESP32-Powered Web-Controlled Surveillance Robot with Camera
P. Rama Thulasi, Sirisala vinod Kumar, Yedke Sandeep, Golla Shiva, Madugundu Govinda Rajulu
This project focuses on the development of a low-cost, web-controlled surveillance robot using the ESP32microcontroller, which offers Wi-Fi capabilities for real-time remote access. The robot is equipped with a camera module that streams live video to a web interface, allowing users to monitor and control...
Proceedings Article
Using Machine Learning Techniques to Improve the Performance of Numerical Weather Prediction Models
O. Sampath, Yaramala Venkata Dharani
The security of industrial supply Chains (ISCs) has progressed with the incorporation of industrial internet of things (IIoT) and Blockchain (BC) technology, presenting sturdy defense in opposition to cyber attacks and ensuring operational resilience. This work examines lightweight machine learning algorithms...
Proceedings Article
Spark-Based Big Data Processing: AI to Decide on Opening a SiU9 Contract Position
N I Lomakin, P D Kravcheny, M C Maramygin, A B Shohnech, I A Samorodova
This paper presents the theory behind using AI for big data processing. It considers an artificial neural network designed to make decisions whether to open a position on a SiU9 futures contract; to that end, Spark-based big data processing is applied. It is hypothesized and proven herein that the futures...
Proceedings Article
Secure E-Voting System With Biometric Authentication
K. Pushpavalli, D. Sathis Pandy, S. Tharun, K. Sundaramoorthy
Secure web-based voting systems improve the accessibility of elections, especially for NRIs and the disabled, through internet-enabled device-based voting from anywhere. Incorporating OTP authentication, facial recognition, and surveillance via cameras enhances security and authenticity of voters. An...
Proceedings Article
AI-System of Stock Exchange Trading Robot for Financial Risk Hedging
N I Lomakin, I A Popov, A B Shohneh, M C Maramygin, A B Gorbunova
The article considered the theoretical basis for the calculation of financial risks, their hedging with the help of artificial intelligence. The article presents a neural network for the assessment of financial risk for atime sequence of VAR-methods with a view to mitigate it when engaging in stock exchange...
Proceedings Article
For Web Software Company– A Micro Company But a Global Business
Ruiyi Li, Sun Yi
This paper mainly discusses the potential basis and feasible development direction of new Internet companies in the globalization age. For dealing with this, we first apply some business assessment statement to conduct various evaluations of the company and proposed a plan to compete directly in the...
Proceedings Article
Url Risk Assessment Using Machine Learning
G. Bhavya, B. Kumaraswamy, O. Kalyan Ram, A. Venkatesh, R. Venkatahema
In today’s digital age, cyber threats like phishing and malware attacks have become increasingly sophisticated, making it essential to develop advanced solutions to protect users. Phishing websites often disguise themselves as legitimate platforms, tricking users into entering sensitive information such...
Proceedings Article
Transfer learning using Generative Artificial Intelligence for Object Detection
S. Prayla Shyry, Sahil, Saranu Akhil
Object detection is the very backbone of computer vision. Applications surface in autonomous vehicles, healthcare diagnostics, and surveillance systems. All the conventional methods of object detection typically require massive amounts of annotated data and use heavy computation, making it hard to use...
Proceedings Article
The Relationship Between Supply Chain Management and Customer Relationship Management
Zhixuan Zhu
In the context of Supply Chain Management (SCM) and Customer Relationship Management (CRM), this article aims to study and explain the relationship between SCM and CRM. The article used case studies and literature research to study whether there is a relationship between SCM and CRM, the strength of...
Proceedings Article
Cloud computing environment based on Web log mining algorithm implementation of test
Jiang Yong-cheng, Bin Wang, Jing Li
Software test is the important means that guarantee software quality and reliability and in this respect it plays the role that other method cannot replace. However software test is a complex process , it needs to consume huge manpower material resources and time which takes the 40%~50% of entire software...
Proceedings Article
Down syndrome Detection in Children With Deep Learning and Using Multi-Model
J. Kishore, Md. Sadiya, N. Maheshwari, N. Nikhitha
One out of every 700 live newborns worldwide is affected by Down syndrome (DS), a genetic disease brought on by an extra copy of chromosome 21. For impacted children to receive the right interventions and have their quality of life improved, early diagnosis is crucial. Traditional techniques for identifying...
Proceedings Article
Automation of Cost Evaluation Methods When Choosing a Commercial Web Resource Through the Example of Primorsky Krai
L V Mkhitaryan, G F Pavlenko, T N Popova, G P Ozerova
The paper discusses practical methods used to evaluate the technical and economic features of the software system design project: the COCOMO method, PERT method and the method of estimating labor costs based on the database dimension. These accurate methods ensure simplicity of calculation and can be...
Proceedings Article
Automatic Diagnosis for Composite Web Service in Cloud Computing
Zhichun Jia, Rong Chen, Junjie Xu
Cloud computing is becoming a popular and important platform for web service applications. With the advent of more and more service resources in cloud, it is a crucial challenge to build an effective diagnostic mechanism. To improve the diagnosis capability for composite web service, we propose an automatic...
Proceedings Article
Privacy Preserving Deep Learning with Learnable Image Encryption on Medical Images
Jarupula Rajeshwar, Somarajupalli Thejaswi, Salendra Manoj Kumar, Sunkapaka John
Deep learning has made significant progress in medical imaging by improving diagnostic accuracy. However, processing sensitive patient data on cloud-based platforms introduces major privacy risks. This study introduces a privacy-centric approach to analysing medical images, utilizing learnable encryption...
Proceedings Article
The Management Education based on Online Informal Learning Technology
C.L. Wen
Information is an essential element in the decision- making processes, and, from a theoretical point of view, the more useful the available information is, the easier decision making becomes. Information and Communication Technologies (ICTs), which are now commonplace in everyday activities, can generate...
Proceedings Article
Research on the Current Situation and Future Trend of Web Celebrity E-commerce Live Streaming Industry
Jinqi Zhang
This paper first explains the specific definition of live e-commerce, and further combs the development process of the industry. In terms of current situation, the author analyzes China’s online Red economy live e-commerce industry from both sides of demand and supply. On the demand side, this paper...
Proceedings Article
Discovering Algorithmic Relationship Between Programming Resources on the Web
Guojin Zhu, Kai Zhang, Jiyun Li
Algorithmic relationships are discovered here for programming tutoring. There are two kinds of algorithmic relationships between programming resources on the web: associative relationship and structural similarity relationship. They can be organized as a hierarchical body. An algorithm can solve different...
Proceedings Article
Secure Web Based System Development
Oluleke Bamodu, Benson Otafu, Liwei Tian
Web based systems which are applications developed for use in networked environments require very high level of in built security. This paper is an attempt to clearly lay out and explain the necessary skills, comparatively analyze several important lifecycles and propose threat modeling techniques for...
Proceedings Article
Hydroponic Automation With IOT and Real-Time Data-Logging For Optimized Crop Growth
M. A. Vijay Kamalnath, G. Tejaswini, N. Sudarshan, S. Ezad Basha, E. Vinay Kumar
Hydroponics is a soilless method of growing plants, has become popular due to its advantages over traditional soil-based agriculture nowadays. To minimize human intervention and no usage of land, we propose the design and development of an automated hydroponics system leveraging Internet of Things (IoT)...
Proceedings Article
Lung Function And Heart Rate Monitoring With Medication Remainders Using Esp-32
K. Sai Prasanna, R. Anirudh Reddy, A. Aakash Reddy, C. H. Rithik Reddy, B. Pranay Varma, C. H. Yogendar
This project deals with monitoring a patient’s vital indicators in real time, such as their respiratory and heart rates, and sending out alarms when aberrant readings are found. The system is appropriate for a range of healthcare applications because it is affordable and simple to set up. The breathing...
Series: Advances in Engineering Research
Proceedings Article
A Better Personalized Image Searching Algorithm
He Huang, Guang feng Sheng, Jing jing Du, Xu Lei, Tao Zhang
Searching engines become the major tool for information retrieval of users with the rapidly increasing Web information. Traditional search engines can't completely evaluate users' search aims. It will lead to retrieval quality decline and increased cost. The paper proposed a better personalized image...
Series: Advances in Engineering Research
Proceedings Article
High Performance Internet image Server Design and Implementation
Genyuan Zhang
How to provide cost effective, high performance image patch query and image patch analysis implementation is one important issue for internet image server design. In this paper, we present one novel approach to internet image server design and implementation. Like most modern internet image server implementation,...
Series: Advances in Engineering Research
Proceedings Article
The Application of Shape Rule in Web Page Design
Yi Shan
With the continuous development of society, the network has become an important mode of contact with people's lives. Web design from the simplest design pattern is now transformed into colorful web effect. Web design is the most important application of the law is the law of the shape, the shape of the...
Proceedings Article
Enhanced Cybersecurity for Web Applications Using External Attack Surface Management
B. Kishore, B. A. Nivvetha, S. Prarthana, K. Rithish, T. Thamaraimanalan
The External Attack Surface Management (EASM) in strengthening cybersecurity defenses is covered in the cyber security-enhanced web application. It draws attention to how the attack surface is dynamic and affected by various elements, including network infrastructure, web applications, and third-party...
Proceedings Article
An Approach of Web Page Information Extraction
Yaohui Li, Lixia Wang, Jianxiong Wang, Jie Yue, Mingzhan Zhao
The Web has become the largest information source, but the noise content is an inevitable part in any web pages. The noise content reduces the nicety of search engine and increases the load of server. Information extraction technology has been developed. Information extraction technology is mostly based...
Series: Advances in Engineering Research
Proceedings Article
Realization of Cross-platform Video and Audio Transmission Technology Based on HTML5
Kai Liang, Sanxing Cao
The current transmission and playback of the streaming media in the WEB browser are mainly depend on the use of the Flash plug-in. And different platforms you need to install the plug-in are often different, that bring a very bad user experience. Combined with UDP transport protocol of streaming media,...
Proceedings Article
A web based method for Measuring Semantic Relatedness between words
Bo You, Tingting He, Fang Li
Semantic relatedness measures play important roles in many fields, such as information retrieval and Nature Language Processing. There are mainly two kinds of traditional methods to measure semantic relatedness: dictionary based and corpus based. However, with the development of information technology,...
Series: Advances in Engineering Research
Proceedings Article
Web robot detection with semi-supervised learning method
Dong Wang, Lei Xi, Hui Zhang, Hebing Liu, Hao Zhang, Ting Song
Web robot is an automated information gathering program that has brought a lot of problems such as information leakage, resource occupation and network security threaten. It is necessary to effectively detect and control the web access comes from web robots. Summarizes the existing categories of web...
Proceedings Article
A Kind of Improved Data Clustering Algorithm in Web Log Mining
Jin Guo, Shengbing Zhang, Zheng Qiu
Aiming at the user clustering and page clustering in Web log mining and based on the analysis of K-means clustering algorithm and matrix clustering algorithm, the paper presented an improved clustering algorithm that combining fuzzy matrix algorithm with K-means algorithm. Extract compressed sub-matrix...
Proceedings Article
Web Celebrity Economy under the Background of E-commerce Live Streaming with Goods Marketing Model
Take Tiktok as an example
Xin Liu, Kexin Zhang
Under the background of the gradual development of the web celebrity economy, the mode of live streaming with goods provides great convenience for people’s lives. Both businesses and consumers make profits in the e-commerce industry. In recent years, live streaming on the TikTok platform has achieved...
Proceedings Article
Study on 3D Technology Application in Art Design
Yan Zhao, Xuguang Yang
Computer 3D technology is the core content of interactive graphic, which is a grid science to calculate, process and display 3D graphic through algorithm. From the digital-processing 3D graphic establishes a set of systematic module database using computer graphic and coding, through which to realize...
Proceedings Article
Design and Realization of Domestic Smart Gateway Based on Wireless Sensor Network
HengNing Deng, Chunlai Zhou, Cheng’an Zhao, Pei Shi
This paper proposes a smart domestic gateway used to manage power consumption, which realizes the interoperability across wireless sensor network (WSN), Wi-Fi and Internet. This system achieves smart home power consumption management. The implementation of hardware and software of the gateway has been...
Proceedings Article
A Service Model Based on Active Rule for the Internet of Things
Jinhui Chen
Based on the traditional web services, the Internet of Things(IoT) service provides real-time information, sufficient information support and necessary decision basis for the IoT applications. However, due to the inconsistency of the interfaces and protocols of the IoT, it brings a higher cost to the...
Proceedings Article
Study on the Criminal Liability of Deep Link in the Crime of Copyright Infringement
Muxi Li
Deep linking is a form of web link, which connects to the content of another webpage but the users cannot tell the resource of the content while viewing those content. Therefore, deep linking is often regarded as an infringement of copyright. However, there is no specific regulations in Chinese criminal...
Proceedings Article
PageRank: Graph Processing Using Dataflow to Rank Web Pages According to Importance
Ziyu Huang
When a huge number of web pages appear, it is difficult for users to find useful information they need. There is a method to solve this problem. It can sort web pages according to their importance. This method is called PageRank in Spark. In this work, we introduced how PageRank works to rank web pages...
Proceedings Article
Trend Analysis of 2008-2021 Mobile Assisted Chinese Language Learning Research——Taking Web of Science and CNKI Net Core Journals as Examples
Yilang Wang
In the era of information globalization, mobile devices have been integrated into our work, study and life. After the global outbreak of the new crown epidemic in 2020, mobile-assisted Chinese teaching has become an important way for the development of international Chinese education, and mobile-assisted...
Proceedings Article
The Technical Analyses of Named Entity Translation
Ying Liu
There are three methods: rule-based method, statistical method and web mining method for named entity translation. The rule-based method did not achieve satisfactory results. High-quality translation equivalents can be obtained from parallel corpora for statistical method, and a prerequisite is the availability...
Proceedings Article
Web Page Data Collection Based on Multithread
Wentao Liu
The web data collection is the process of collecting the semi-structured, large-scale and redundant data which include web content, web structure and web usage in the web by the crawler and it is often used for the information extraction, information retrieval, search engine and web data mining. In this...
Proceedings Article
A Semantic Query Method for Deep Web
Hao Jiang, Wen-ju Liu, Li-li Lu
Based on the idea of "functionality-centric", this paper proposes a complete set of oriented semantic query methods for Deep Web, builds up the relevant software architecture, provides a new method for full use of Deep Web data resources in semantic web environment through describing the establishment...
Proceedings Article
A PDA-based System development and implementation for Manufacturing Execution System
Xin Wang, Guangrong Yan
This paper describes a PDA-based mobile system of workpiece data inquiring and acquisition that can process data by calling the Web Service. The system is practically tested and verified in a MES project, the result shows that it can provide the effective product information through scanning bar code,...
Proceedings Article
The Application of Web Services in the Monitoring System of Internet of Things
Qiong Guo
For large monitoring objects, often require tens of thousands of concurrent report data monitoring sensor, and often involve the high-speed data acquisition frequency, resulting in high speed large concurrent real-time transmission of data flow, the design of the monitoring system of communication service...
Series: Advances in Engineering Research
Proceedings Article
Design and Realization of Data Mining System based on Web
Defu He
For enterprises, it appears especially important to survive in the increasingly fierce competition in the business and strive for more customers. If they understand what customers need and interested better, and make key decisions that can attract more users to buy their goods, then they will make more...
Proceedings Article
The Page Flow Implements Business Logic In Web Applications
Haijun Li
This paper discusses the application of the technology of NetUI flow page in the business logic of Web applications. The page flow uses declarative programming method, and has session state and modular design, which can be nested to use and effectively separate the logical code in the Web applications,...
Proceedings Article
Research on the Design of Interface in the Micro-Portal Web Game
Yandong Chen, Xiuming Sun
With the development of our society, the progress of science and technology, as well as the highlight of user time’s fragmentation characteristics, the characteristics of users in game industry have taken dramatically changed, and as the number of web game users has gradually increased, many companies...
Series: Advances in Engineering Research
Proceedings Article
Application Research on International Trade Information Management System Oriented On Service
Kejia Yin
With the rapid development of network communication technology and Internet technology, international trade enterprises will face the business operation mode change by using the advanced information technology to strengthen the traditional advantages itself. The application of international trade information...
Proceedings Article
Quantum Computing Integrated Digital Interaction Platforms for Secure Public Engagement Decentralized Data Exchange and Policy Optimization
Venkata Bhardwaj Komaragiri, G. Keerthana, S. K. Fathima, Satvik Vats, R. V. Priya, S. Sivagami
Combining quantum computing with digital interaction platforms creates the potential to secure public engagement, enable decentralized data exchange, and to optimize policy across various sectors. Most of them mainly concentrate on the theoretical optical/quantum cryptography and network security, but...
Proceedings Article
Database Modeling and Visualization Simulation technology Based on Java3D
Hongxia Liu
Computer simulation technology has been applied to many industries and fields, due to its intuitive, convenient and interactive visualization. Java3D programming technology is easy to be operated, and its cross platform performance is good, and it is easy to develop web-based applications, so it is the...