Content uploaded by Samata Gadde
Author content
All content in this area was uploaded by Samata Gadde on Jul 20, 2023
Content may be subject to copyright.
Analysis on the Growth of Artificial
Intelligence for Application Security in
Internet of Things
K. T hiagarajan
Professor,
Departm ent of
Mathemat ics,
K. Ramak rishn an
College of Technology,
Samayapuram,
T richy,
T amilnadu,India
plccampus@gmail.com
Chandra Kumar
Dixit
Dean, Faculty Of
Science &
T echn olo gy,
DSMNRU
University ,
( Dr. Shakunt ala
Mishra National
Rehabilitat ion
University )
Luckno w , Uttar
Pradesh, In dia
Dr.M.Panneerselvam ,
Assistant P rofessor
Departm ent of EEE
Sona college o f
T echn olo gy, Salem,
T amil Nadu, India.
C.Arunkumar
Madhuvapp an
Assistant Professor,
Departm ent of
Elect ronics and
Communication
Engineering,
Vinayaka
Mission’s
KirupanandaVariyar
Engineering
College, Vinayaka
Mission’s Research
Foundatio n
(Deemed to be
University ), Salem,
T amil Nadu, India
Samat a Gadde
Professor
Departm ent of Bio
T echn olo gy
Acharya Nagarjuna
University
Nagarjuna Nagar
Guntur 522510
Jyot i N Shro te
Assistant
pro fessor,
Dept o f
computer
science
Indira college
of commerce
and Science,
Pune-33
Abstract
Artificial intelligence is a subfield of computer
science that refers to the intelligence displayed by
machines or software. The research has influenced
the rapid development of smart devices that have a
significant impact on our daily lives. Science,
engineering, bus ines s , and medicine have all
improved their prediction powers in order to make
our lives easier in our daily tasks. The quality and
efficiency of regions that use artificial intelligence
has improved, as shown in this s tudy. It
success fully handles data organisation and
environment difficulties, allowing for the
development of a more solid and rigorous model.
The pace of life is quickening in the digital age,
and the PC Internet falls well short of meeting
people's needs. Users want to be able to get
convenient network information s ervices at any
time and from any location
Keyword:- Artificial intelligence ,Cryptography,
Security, digital library, Daily lives, Human Life
security,
1. Introduction
To illustrate its practical relevance, this application
can be used in a variety of fields, such as business,
management, and advertising. Extens ive research
has been done to demonstrate the capabilities of
genetic algorithms and to utilise their robus t
qualities across a wide range of applications . This
application can be used in a variety of activities
(medical, business , etc.) The recommendations that
resulted could serve as the foundation for future
research into the usage of genetic algorithms in the
commercial world. Artificial intelligence is one of
the most hotly debated topics today. “Artificial
intelligence can be beneficial or detrimental to
humans " is today's burning ques tion about AI. The
advantages of artificial intelligence in medicine are
examined in this res earch paper. It investigates how
artificial intelligence aids the medical industry, as
well as how this widespread phenomenon affects
patient health in identifying diseases, treating
patients, decreas ing errors, and virtually being
present with patients.
Artificial intelligence improves the accuracy and
individuation of foreign language acquisition. The
development of virtual reality for visual teaching,
situational teaching, immersion learning, and other
teaching approaches has increased learners' interest
in studying languages and aided the reform of
Indian language education. Artificial intelligence
will give any language training, a new meaning and
value in the future. How can learners' language
application capacity of listening be improved?
Artificial intelligence ass ists with speaking,
reading, writing, and translating. How to obtain
large-scale and high-quality data, how to build
more effective ecological models of learners and
teachers, how to seek theoretical s upport for
artificial intelligence in foreign language teaching,
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
978-1-6654-0052-7/22/$31.00 ©2022 IEEE 6
2022 Second International Conference on Artificial Intelligence and Smart Energy (ICAIS) | 978-1-6654-0052-7/22/$31.00 ©2022 IEEE | DOI: 10.1109/ICAIS53314.2022.9742985
Authorized licensed use limited to: ROBERT BOSCH. Downloaded on May 04,2022 at 11:03:22 UTC from IEEE Xplore. Restrictions apply.
how to use big data analysis, cloud computing, and
upgrade intelligent teaching systems, and how to
achieve a comprehensive advance in teaching effect
and students' language learning ability
The main components of how AI is employed in
indus trial applications are highlighted. The
integration of AI and MI into the operation of smart
cities is highlighted. With the support of IoT, the
digital twin offers a significant contribution to
Industry 4.0. Information and communication
intelligence techniques assist in determining factors
such as functional dimensions via which devices
may be sensed and thes e technologies can be linked
to people and vice versa. Big data is critical to the
trans formation of the SG's organisational
framework and the efficient use of resources in
smart cities.
2. Information Security and Machine Learning
Artificial intelligence has advanced with today's
developed and widely acces s ible information,
utilising artificial intelligence to achieve
information security will be a prominent topic with
apparent economic benefits.
3. Artificial Intelligence
With the advent of the digital era, an increasing
number of people, indicating that how to safeguard
information is progressively becoming a critical
concern affecting individuals. Techniques are being
questioned on a daily basis, but artificial
intelligence provides a rapid development
"protective umbrella."
4. Information Society and Artificial Intelligence
Artificial intelligence, as the name implies, is the
study of how to use machines to mimic the human
brain to conduct thinking and activities such as
inference, design, thinking, s tudy, and s o on, with
the goal of assisting people in solving problems
that would otherwise be solved by experts; in
layman's terms, it is the execution of intelligent
activities of mankind with the aid of computers to
eventually realis e s ome "machine thinking" or
brain power automation using various automation
machines .
Artificial intelligence, on the other hand, has a very
broad academic s cope, encompassing a wide range
of s ubjects and practically every field of theory and
application in which people are interes ted. People
are powerless in the absence of artificial
intelligence. A s a result, any field could be a
potential application field for artificial intelligence,
such as using artificial intelligence's method and
technology.
The public's need for information s ecurity will be
met, and it will be the era's obligation. Artificial
intelligence technology, in this context, is a
technology that mimics advanced intelligence's
inference and computation technology, and it has
demonstrated its s uperiority in a wide range of real-
world control and management difficulties.
5.The Intersection of Information Security a nd
Human Life
In today's networked information society,
information security refers to the protection of
networks agains t various dangers , disruptions, and
scratch. However, such events occur frequently in
our daily lives .
6.The Impact of Information Security on Human
Life
The majority of hackers carry out their attacks
under the guise of being someone else. By
exploiting security flaws or vulnerabilities in
systems, attackers can get access or privileges
without authorization. For example, attackers could
use various methods of assault to discover specific
"features" of s ystems that should have been kept
hidden but are now revealed; by exploiting these
"features," attackers could circumvent the protector
and get acces s to the inside system, caus ing
damage.
Different Categories
(1) A person who has been granted permission to
utilise a sys tem or in sequence resource for one
purpos e changes the permission to be us ed for
other, non-authorized purposes, often known as a
"internal as s ault."
(2) A computer virus is a programme that may
perform transmis s ion and attack operations while
computer sys tems are in use.
(3) The data comes from discarded drives or
printed storage media. The intruder gets past the
physical security and into the system. Important
security items, such as tokens or identification
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
978-1-6654-0052-7/22/$31.00 ©2022 IEEE 7
Authorized licensed use limited to: ROBERT BOSCH. Downloaded on May 04,2022 at 11:03:22 UTC from IEEE Xplore. Restrictions apply.
cards , are s tolen. Business deception: a fabricated
system or s ystem component deceives legitimate
users or s ystems into happily giving over sens itive
data, etc.
7. Digital Watermark
Chemical secret writing, which uses medical
liquids such as milk, alum, and fruit juice, is the
most often employed method. Previously, the most
common modes of secret communication were
secret writing and code. Secret writing, in contras t
to cryptographic techniques , did not evolve into a
distinct discipline from start to finish, owing to a
lack of fundamental academic foundation. The
digital watermark technology entails embedding
secreted sentinel in digitalized compact disc
material via a signal process ing method. The
sentinels are normally undetectable and can only be
found us ing sophisticated detectors or readers.
Because today's information s ecurity measures are
all cryptography -bas ed, this s ecret protection
mechanism has become increas ingly insecure as
computer proces sing power has increased, and the
digital watermark is the outcome of this rapid
artificial advance. Digital watermarking is an
essential s tudy area that will give super-powerful
information security protection.
7.1 Prospects for Growth
The improved computer network. However, it is
incredibly simple to replicate and edit digital
works, and they may be made to look exactly like
the originals. In the data concealing principle, a
"Digital Watermark" renders copyrights invisible or
unlistenable, protecting copyrights on the
assumption that no damage is done to original
works.
8. Security Technology Management
Artificial intelligence (AI) res earch has long been
inspired by human cognition, with the goal of
producing intelligent behaviour in artificial
systems. Artificial intelligence's most critical
component is repetitive learning. The electronic
security sector in India is data-intens ive, with sites
capable of producing 1000 000 events per day and
more than 1000 GB of video and voice data each
day. Many s ecurity res earch and development
organisations are examining AI to help human
operators separate vital information from the flood
of data.
New AI-bas ed products and sys tems that can
deliver human-like s enses and reas oning have a
high selling potential. This article provides an
overview of AI's current and potential applications
in the Indian s ecurity business. The article
emphasises AI's ability to provide value to security
systems as a management tool.
This article discusses s ome of the benefits of us ing
artificial intelligence in the security technology
environment for s ecurity system management.
Artificial intelligence is a broad term that refers to
machine learning technologies that can generalise
information, or solve issues that haven't been s een
before. A rtificial intelligence includes expert
systems, artificial neural networks (ANN), kernel
machines , and fuzzy set theory (AI).
Financial constraints may also prevent them from
employing human resources, s uch as topic experts,
to manually s earch through a variety of vast data
bas es . Manual searches are prone to errors and bias,
as well as being exceedingly expens ive and time
consuming. Becaus e the goal of deploying security
technology is to identify and warn decision makers
in the quickest time possible, so that they can act to
avoid any s ecurity breach, time is a critical variable
in security. In the security bus ines s , pos t -mo rtem
knowledge is almost useless .
9. Artificial intelligence is us ed to prune data.
A. The us er can then decide whether to maintain or
reject the sensors after isolating the non-ess ential
inputs. Hardware and telecommunications cos ts can
be cut by reducing the number of sens ors.
B. Machine learning for gues s ing miss ing data
To make a judgement, a person or machine
frequently requires all of the inputs . In a modern
security setting, for example, if one or additional
sens ors fail,
C. Biometric sys tems with artificial intelligence
The study of automated s ystems for uniquely
distinguishing persons based on phys ical or
behavioural features is known as biometrics.
Because AI can learn to categorise, which is
actually a unique identification, it has been widely
employed in the security field.
10. Video System Artificial Intelligence
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
978-1-6654-0052-7/22/$31.00 ©2022 IEEE 8
Authorized licensed use limited to: ROBERT BOSCH. Downloaded on May 04,2022 at 11:03:22 UTC from IEEE Xplore. Restrictions apply.
(1) Identifying thing by its characteristics, paint,
and figure.
(2) Track substance in a video s tream by es timating
missing variables.
(3) Explosions , s tolen hand baggage, bomb
intimidation from s olitary baggage, and as s ault are
all incidents that can be detected based on the
quicknes s of visual impres s ion.
(4) Biometric item detection and recognition using
voice, gait, or a mix of the two.
(5) Assisting s taff in identifying things in scanners
on behalf of forced/non-metal lethal weapons
agains t known targets.
(6) Analyzing the information and ocular
information obtained at the beginning to is olate
essential compounds in popular gulp of air and be
concerned .
11. Indus try of Security
Buying AI software and goods from worldwide
marketplaces is an eas y approach to gain non-
natural intelligence capabilities in the South
African safety sector. Buying off-the-shelf AI
workings and software depletes India’s indus trial
R&D foundation as a rising economic powerhouse.
Any State industrialization can be aided through
the procurement of finished goods and systems.
Through R&D research and the production of
original products, must establish its own indus trial
bas e.
Like all growing economies, SA should build a
robust collaboration network between universities
and local indus try bus ines s es to s peed up the
patenting and commercialization of technology
advances. The International Biometric Group's
(2006) statistics reveal that global revenue from
biometric technology sales is predicted to increas e
in the four years from 2006 to 2022.
12.AI applications
The creation of breakthrough intelligent s olutions
for the security bus ines s relies heavily on AI
research. In off-sight sens itive security domains, AI
has the ability to give creative solutions.
The main goal of information s ecurity is to protect
an organization's important res ources, s uch as
hardware, software, and financial resources , as well
as tangible and intangible assets . A company can
achieve its security goals by employing appropriate
security methods and procedures. Artificial
intelligence technology excels at supervising and
managing operations where humans fall short,
hence its us e in networking has increased
performance and s ecurity. It also examines new
breakthroughs in information concealment
techniques, which are the current trend in
information security. Finally, the best gaps for
future work will be discuss ed.
Information is critical to the management and
maintenance of any organization's activities. It
benefits a company at all levels and gives it a
competitive advantage [1-2]. As a result,
information security is a key concern because it is
subject to a number of threats. Information s ecurity
refers to the people who interact with the sys tem
both inside and outs ide the organisation.
Information s ecurity breaches can occur from
within or outside of a company, resulting in
significant economic loss es .
Artificial Intelligence is the s tudy of employing
machines to do tasks s imilar to those performed by
humans. The machine simulates human thinking
and activities [3-5]. The goal is to as sist people in
making decisions and handling duties that were
previously completed by profess ionals. AI creates
intelligent machines that us e computers to carry out
all intelligent tasks. Al has a broad scope because it
covers a wide range of disciplines and themes.
Researchers are constantly working on A l since
using AI to construct an expert sys tem that can
execute all ess ential jobs can ach ieve wonders.
13. Artificial Intelligence and Information Security
Internet and networks have revolutionised the
working scenario throughout the creation of the
information society. It is critical to secure the
information that travels around the world. The
majority of A I research focuses on problem
solving, thinking, and learning. The security
bus ines s is gravitating toward artificial intelligence
technology, which is used in a variety of fields such
as biometrics, telecommunications, operating
systems, and many others. Information security is
achieved using a variety of techniques s uch as
digital watermarking, intrusion detection,
information concealing, and so on.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
978-1-6654-0052-7/22/$31.00 ©2022 IEEE 9
Authorized licensed use limited to: ROBERT BOSCH. Downloaded on May 04,2022 at 11:03:22 UTC from IEEE Xplore. Restrictions apply.
To improve the security s ys tems' efficiency, the
most recent trend is to include AI. By es tablishing
innovative s ecurity technologies, AI is expected to
bridge the gap between artificial and natural
intelligence.
In order to build and s imulate AI-integrated
algorithms for threat identification and prevention,
various AI techniques were used. AI has played a
significant role in the development of intrusion
detection and has a number of notable advantages
over other methods. Using AI methods, numerous
subs tantial works on network s ecurity, monitoring,
and measurement have been completed.
It included privacy information into the server and
monitors the condition of privacy on a cons tant
bas is[6-8]. In government organisations , classified
information sys tems play an important role [9]. For
class ified information s ecurity s ystems, risk
assessment procedures and methodologies have
been specified [10]. There have been numerous risk
assessment models developed and analys ed These
models have several restrictions. An analytic
hierarchy process and grey theory [11] are us ed to
prove this ris k assessment model for classified
information s ys tems. In the context of social
networking, AI has also been utilis ed to protect
privacy. Neural networks, fuzzy logic, and expert
systems are some of the techniques that are proving
to be extremely beneficial. In the current
environment, when cyber-attacks and intelligent
malware are on the rise, intelligent defence security
systems are required [12]. Artificial Intelligence
techniques can be used to make defence
mechanisms more powerful against large-scale
attacks. Even when resources are limited, utilis ing
intelligent AI approaches, defence sys tems can
outperform large-scale attackers. It sugges ts that
intelligent techniques to decision support, situation
awarenes s , and knowledge management s hould be
adopted . Security policy documentation, access
control, employee knowledge, and top -level
management support were described as the four
key characteristics of a conceptual framework
incorporating the important components .
Access control, intrus ion detection, firewalls, and
other information s ecurity techniques are only a
few examples. Each security technique mus t be
analys ed in terms of bus ines s context and
technological context in order to meet the
organization's security needs and to fit the
technology.
The key iss ues are discussed in this paper, as well
as the work that has been done in the field of
security sys tems. As a consequence of the analys is,
it was concluded that the research had mos tly
concentrated on technical concerns, and many
research implications were presented. It has been
pointed out that there is a lack of empirical study in
developing a secure information management
system . Enterprise security architectures are being
created in order to develop a s olution that is both
efficient and reliable.
ACS, or Industrial Automatic Control Sys tems, is a
new type of technology that has been popular in
recent years. Risk as s es s ment, creation, and
deployment of countermeasures, as well as
validation and monitoring of results, are the three
phases of security management.
Inside the pitch of in turn s ecurity, data concealing
has become a popular notion. Data hiding includes
cryptography, digital watermarking, steganography,
and other techniques that aid in maintaining the
security of data. Copyright protection and copy
control are common uses for them. Content
authentication, broadcas t monitoring,
fingerprinting, metadata binding, and covert
communication are all examples of content
authentication. Least Significant Bit embedded
approaches were used to s ecure the photos,
although they are inefficient. Medical images come
in a variety of forms in healthcare applications .
Digital watermarking techniques were employed to
verify the accuracy of the image. For medical
photos, two alternative watermarking methods have
been devised .
The purpose of this paper is to show the results of
several research projects in the subject of
information security. They covered numerous
aspects of preventing any form of attack on an
organization's network and security. In every
bus ines s , there are no information security
management methods that can suit top -to-bottom
management.
The main focus of enterprises these days is to
protect their network and information from any
type of attack. The following gaps have been
identified:. One of the major limitations in the
development of security breakthroughs is that they
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
978-1-6654-0052-7/22/$31.00 ©2022 IEEE 10
Authorized licensed use limited to: ROBERT BOSCH. Downloaded on May 04,2022 at 11:03:22 UTC from IEEE Xplore. Restrictions apply.
are developed in a fragmented and non-
standardised manner. This makes it difficult for
cus tomers to integrate security developments from
different retailers or to us e a single solution acros s
several applications . Artificially intelligent sys tems
have the potential to improve the productivity,
functionality, and utility of the interface platform
for a variety of security solutions.
This will strengthen the security s ector by laying
the groundwork for the fus ion of numerous
restrictive security frameworks .One of the most
important requirements of AI is the continual
updating of the training s et, which is a difficult
operation in many s ecurity sys tems. The predictive
relationships between the tes t data will have
particular stated outcomes in an enterprise
information management context. The ris ks are
assessed by a vulnerability as s essment of the
network's nodes. A framework for analysing secure
systems that identifies the system's flaws an d offers
the appropriate actions must be developed.
14. Conclusion
Due to the shortcomings, it is neces sary to establish
an AI-integrated, resourceful, and trustworthy
safety framework with the purpos e to help
bus iness es at all levels of operation. There's also a
big demand for figuring out how vulnerable
networks are by observing node behaviour.
Intelligent procedures must be used to implement
and test a powerful enterprise network.
Reference
[1] Han, J., and Kamber, M., (2001) Data Mining:
Concepts and Techniques, Morgan Kaufmann
Publishers, San Francisco.
[2] International Biometric Group, (2006)
Biometrics Market and Indus try Report Addres s es
Biometric Inves tment Landscape Through 2010,
Website news letter, Available:
www.biometricgroup.com
[3] M. Dhingra, M. Jain and R. S. Jadon, "Role of
artificial intelligence in enterprise information
security: A review," 2016 Fourth International
Conference on Parallel, Distributed and Grid
Computing (PDGC), 2016, pp. 188-191, doi:
10.1109/PDGC.2016.7913142.
[4] A. A. Osuwa, E. B. Ekhoragbon and L. T. Fat,
"Application of artificial intelligence in Internet of
Things ," 2017 9th International Conference on
Computational Intelligence and Communication
Networks (CICN), 2017, pp. 169-173, doi:
10.1109/CICN.2017.8319379.
[5] A. Nayak and K. Dutta, "Impacts of machine
learning and artificial intelligence on mankind,"
2017 International Conference on Intelligent
Computing and Control (I2C2), 2017, pp. 1-3, doi:
10.1109/I2C2.2017.8321908.
[6] H. Zhang, "Application Analysis of Artificial
Intelligence Technology in the Development of
Mobile Internet," 2020 International Conference on
Advance in Ambient Computing and Intelligence
(ICAACI), 2020, pp. 63-66, doi:
10.1109/ICAA CI50733.2020.00018.
[7] S. S. Kumar, A. Sudhir Bale, P. M. Matapati
and V. N, "Conceptual Study of Artificial
Intelligence in Smart Cities with Industry 4.0,"
2021 International Conference on Advance
Computing and Innovative Technologies in
Engineering (ICACITE), 2021, pp. 575-577, doi:
10.1109/ICACITE51222.2021.9404607.
[8] C. Savulescu and Z. Polkowski, "A n approach
for systems identification using artificial
inteligence," 2017 9th International Conference on
Electronics, Computers and Artificial Intelligence
(ECAI), 2017, pp. 1-4, doi:
10.1109/ECAI.2017.8166472.
[9] S. Yeas min, "Benefits of Artificial Intelligence
in Medicine," 2019 2nd International Conference
on Computer Applications & Information Security
(ICCAIS), 2019, pp. 1-6, doi:
10.1109/CAIS.2019.8769557.
[10] X. Shang and C. Zhao, "Research on the
Application of Artificial Intelligence in Computer
Network Technology," 2020 5th International
Conference on Mechanical, Control and Computer
Engineering (ICMCCE), 2020, pp. 1107-1110, doi:
10.1109/ICMCCE51767.2020.00243.
[11] Y. XIao-yang, "Study on Development of
Information Security and Artificial Intelligence,"
2011 Fourth International Conference on Intelligent
Computation Technology and Automation, 2011,
pp. 248-250, doi: 10.1109/ICICTA.2011.72.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
978-1-6654-0052-7/22/$31.00 ©2022 IEEE 11
Authorized licensed use limited to: ROBERT BOSCH. Downloaded on May 04,2022 at 11:03:22 UTC from IEEE Xplore. Restrictions apply.
[12] S. M. Dhlamini, M. O. Kachienga and T.
Marwala, "Artificial intelligence as an aide in
management of security technology," AFRICON
2007, 2007, pp. 1-5, doi:
10.1109/AFRCON.2007.4401470.
[13]S. Wenhui, W. Kejin and Z. Aichun, "The
Development of Artificial Intelligence Technology
And Its Application in Communication Security,"
2020 International Conference on Computer
Engineering and Application (ICCEA), 2020, pp.
752-756, doi: 10.1109/ICCEA50009.2020.00164.
[14]A. Okutan and C. Eyüpoğlu, " A Review on
Artificial Intelligence and Cyber Security," 2021
6th International Conference on Computer Science
and Engineering (UBMK), 2021, pp. 304-309, doi:
10.1109/UBMK52708.2021.9558949.
[15]K. Jha, S. Anumotu, Pronika and K. Soni,
"Security Issues and Architecture of IOT," 2021
International Conference on Artificial Intelligence
and Smart Systems (ICAIS), 2021, pp. 1381-1385,
doi: 10.1109/ICA IS50930.2021.9395962.
[16]G. Ramachandran, C. K. DIXIT, K. Kishore
and A. Arunraja, " Performance Analysis Of
Mantiss a Multiplier And Dadda Tree Multiplier
And Implementing With Dsp Architecture," 2021
International Conference on Artificial Intelligence
and Smart Systems (ICAIS), 2021, pp. 1583-1587,
doi: 10.1109/ICA IS50930.2021.9395883.
[17]R.Sethupathi,ChandraKumarDixit,V.V.HariBa
bu,G.Ramachandran,A.Arunraja,T.Muthumanicka
m”Application of coagulation and flocculation of
water and reus e wastewater treatment in
Agriculture” AIP Conference Proceedings
2396,030019(2021);ISSN1551-
7616,https ://doi.org/10.1063/5.0066335
[18]M. Deivakani, C. Singh, J. R. Bhadane, G.
Ramachandran and N. Sanjeev Kumar, "ANN
Algorithm based Smart Agriculture Cultivation for
Helping the Farmers," 2021 2nd International
Conference on Smart Electronics and
Communication (ICOSEC), 2021, pp. 1-6, doi:
10.1109/ICOSEC51865.2021.9591713.
Proceedings of the Second International Conference on Artificial Intelligence and Smart Energy (ICAIS-2022)
IEEE Xplore Part Number: CFP22OAB-ART; ISBN: 978-1-6654-0052-7
978-1-6654-0052-7/22/$31.00 ©2022 IEEE 12
Authorized licensed use limited to: ROBERT BOSCH. Downloaded on May 04,2022 at 11:03:22 UTC from IEEE Xplore. Restrictions apply.