G. Elizabeth Rani, H. Mohan, Bendela Kusuma, P. S. Kumar, Ardhala Mounika Jenny, Nukala Akshith
{"title":"Automatic Evaluations of Human Blood Using Deep Learning Concepts","authors":"G. Elizabeth Rani, H. Mohan, Bendela Kusuma, P. S. Kumar, Ardhala Mounika Jenny, Nukala Akshith","doi":"10.1109/ISPCC53510.2021.9609519","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609519","url":null,"abstract":"Identification of human blood is very important to know before any blood transfusion. In emergency situations, if the blood group is not identified exactly, it causes many problems to the patient and may become fatal. Generally, the blood group is identified manually by the lab technicians performing blood tests. In all times, humans cannot be perfect, and in this pandemic, lab technicians need to handle large number of blood samples. So, the manual identification may undergo human errors. The idea of the present paper tends to solve the human errors using deep learning techniques. The proposed system identifies the blood group of each person and reduces the human errors. This would save the time consuming for testing and gives efficient results with good precision and accuracy. Deep learning obtains the blood sample from blood donation applications and have a trained model to predict the given image. Using the latest image processing models, the blood samples are detected. The result through the proposed system is a set of clustered blood samples. Thus, the proposed system benefits the society and efficiently affects the medical diagnosis.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123738216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Multiplier Architecture for ECC Core","authors":"Gutti Naga Swetha, Anuradha M.Sandi","doi":"10.1109/ISPCC53510.2021.9609418","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609418","url":null,"abstract":"High significance of elliptic Curve Cryptography (ECC) has been seen in many applications over the years since its development in 1986. ECC is widely utilized for security academies, design protocols, device security, arithmetic algorithms and structures etc. Due to its shorter key length, ECC has becomes first choice for many IoT and electronic devices. However, enormous enhancement of cyber-attacks and crimes in digital market has provided a necessary reason to make ECC more robust and stable to handle this kind of threats i.e. a major enhancement in ECC core is a necessity. Therefore, this paper introduces a High Throughput Concurrent Computation (HTCC) technique for Elliptic Curve point multiplier architecture. The synthesis using the proposed HTCC technique is performed on Xilinx Virtex – 5 and Xilinx Virtex – 7 FPGA over GF(2163). The efficiency is increased by 75.31% for Xilinx Virtex – 5 and 47.75% using proposed model for Xilinx Virtex – 7. The resource utilization is decreased by 65.80% for Xilinx Virtex – 5 and 67.59% using proposed model for Xilinx Virtex – 7. The performance results are satisfactory for the factors like timing, resource utilization, frequency and latency of the architecture.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximum Likelihood Decoder For Image Watermarking Techniques","authors":"Preeti Sharma","doi":"10.1109/ISPCC53510.2021.9609406","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609406","url":null,"abstract":"The paper extends a general approach for extracting the watermark using a mathematical technique for watermarking using Discrete Wavelet Transform (DWT). Though the watermark may be inserted using quantization or a combination of other transforms, yet the successful recovery of watermarks is a difficult task. It is indeed a challenge for the decoder to recover the watermark when various attacks are applied upon a watermarked image. The corresponding scheme of watermark decoding uses the principle of Maximum Likelihood (ML) estimation and is based upon the statistical modeling of parameters of Gaussian distribution. The watermarking experiments utilizing ML decoder exhibit improved performances over the conventional approaches of watermarking employing correlation detectors. The robustness of such techniques is verified through the values of Bit Error Rate (%).","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127649773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Error Detection And Correction In TCAMS Based SRAM","authors":"Suman Mishra, K. Radhika, Y. M. Babu","doi":"10.1109/ISPCC53510.2021.9609517","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609517","url":null,"abstract":"Ternary content addressable memories (TCAMs) widely utilized in network systems to enforce the labeling of packets. For example, they are used for packet forwarding, security, and software-defined networks (SDNs). TCAMs are typically deployed as standalone instruments or as an embedded intellectual property component on application-specific integrated circuits. However, field-programmable gate arrays (FPGAs) do not have TCAM bases. However, FPGAs’ versatility allows them to appeal for SDN deployment, and most FPGA vendors have SDN production kits. Those need to help TCAM features and then simulate TCAMs using the FPGA logic blocks. Several methods to reproduction TCAMs on FPGAs have been introduced in recent years. Some of them use a huge multiple storage blocks within modern FPGAs to incorporate TCAMs. A trouble while remembrances are that soft errors that corrupt stored bits can affect them. Memories may be covered by a parity test to identify errors or by an error correction code, although this involves extra bits in a word frame. This brief considers memory security used to simulate TCAMs. It is shown in particular that by leveraging the assumption its part of potential memory information is true, most single-bit errors can be resolved when memoirs are emulated with a parity bit.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125497370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Block Chain Based Cognitive Wireless Networks: Challenges & Applications","authors":"Simran Taneja, Nikhil Marriwala","doi":"10.1109/ISPCC53510.2021.9609395","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609395","url":null,"abstract":"The recent advances in wireless communication have led to the problem of growing spectrum scarcity. The problem of spectrum allocation is due to advance research in wireless communication. As new wireless applications are emerging, day after another, and making use of the available wireless spectrum for communication, the demand for spectrum increase makes the available spectrum scarcer. Mostly part of spectrum is not utilized significantly in wireless network. Cognitive Radio (CR) is a new technology that enables an unlicensed secondary user to coexist with licensed primary users in licensed spectrum bands without inducing interference to licensed primary users communication. This technology can significantly ease the spectrum redundancy problem & enhance the efficiency of utilization of spectrum. Cognitive Radio Networks (CRN) or Dynamic Spectrum Access Networks are formed by several CR nodes and they are often called as NeXt Generation (XG) communication networks. This XG communication network is expected to give high transfer speed to versatile clients through heterogeneous remote designs and dynamic range access procedures. CRNs have drawn in incredible exploration interest in the new years. Nonetheless, research on the security parts of CRNs has been exceptionally restricted. As CRN is like remote organization, the idea of the remote media is outside, it is more helpless against assaults when contrasted with that of wired organization. In this channel might be stuck/abuse due to remote media information is to be listened.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125498753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An NHPP-Based SRGM with Time Dependent Growth Process","authors":"Md. Asraful Haque, N. Ahmad","doi":"10.1109/ISPCC53510.2021.9609454","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609454","url":null,"abstract":"The mathematical model that is used to forecast how software reliability will improve over time when errors are identified and resolved, known as a “Software Reliability Growth Model” or in short SRGM. These models assist the management in determining how much time and effort should be dedicated to testing. This paper presents a new SRGM that analyzes the failure data with the help of nonhomogeneous Poisson process. The model assumes the linear increment in fault detection rate process. The proposed model is validated on a dataset collected from an industrial project. The comparison results with seven established models in terms of four criteria have been reported.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123182383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Jaspin, S. Selvan, J. Rose, Jeswin Ebenezer, A. Chockalingam
{"title":"Real-Time Surveillance for Identification of Fruits Ripening Stages and Vegetables Maturation Stages with Infection Detection","authors":"K. Jaspin, S. Selvan, J. Rose, Jeswin Ebenezer, A. Chockalingam","doi":"10.1109/ISPCC53510.2021.9609441","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609441","url":null,"abstract":"For every fruit and vegetable, there are various ripening stages and maturation stages. For example, according to US standards for greenhouse tomatoes, there are six stages in tomato ripening. But the useful stages are only last two. Improper supervision in harvest methods and fertilization leads to the decrease in the post-harvest life of fruit and vegetables. Monitoring the ripening stages and maturation stages require proper knowledge of color and size of fruits and vegetables. In order to decrease excessive labor charges and wastages of fruits and vegetables, autonomous farming methods can be introduced. In autonomous farming, the main objective is to detect a vegetable or a fruit is ripe or not and it’s infected or not. If this objective is achieved then farmers can easily harvest fruits and remove the infected fruits too. The infected fruits need to be removed so that it doesn’t infect others. And proper fertilizers can be given to there to fruits. For example, if mango is infected by a deficiency disease then proper vitamin fertilizer can be given to the fruit. So by using image processing in python using an efficient HSL color space algorithm and OpenCV library,a real time monitoring system is made to identify the maturation and ripening stages of a vegetable or fruit and to check whether a fruit is infected or not. Based on the comparison of existing systems for various fruits and vegetables, there is a very scarce availability for some fruits and vegetables detection of stages, which specifically in real time image processing. By using images there are lot of disadvantages where we need to take a lot of pictures, the lighting, and in real time in farming it is tedious. So live detection of image processing is done in the proposed system using Open CV library in python. In existing system RGB color spaces are used. Here an efficient algorithm using HSL color space is used to identify a fruit vegetable ripening and maturation stages. The proposed system also includes the detection of diseases in fruit or vegetable using the above method. This is done by setting the specific color ranges, brightness and saturation ranges in algorithm and metrics for shapes and size too. By an efficient setting of these metrics an efficient algorithm is found out.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116126231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayushi Singh, Aarushi, Sonal Jha, R. Nehra, NS Raghava
{"title":"Metamaterial Loaded Dual-Band Circularly Polarized Compact Implantable Antenna with and without Shorting Pin","authors":"Ayushi Singh, Aarushi, Sonal Jha, R. Nehra, NS Raghava","doi":"10.1109/ISPCC53510.2021.9609343","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609343","url":null,"abstract":"In this treatise, a neoteric metamaterial (MTM) loaded dual-band circularly polarized (CP) compact implantable antenna has been proposed for ISM band (2.4 GHz to 2.48 GHz) and GSM band (1.78 GHz to 1.83 GHz).The work focuses on the analysis of multiple different metamaterial designs, integration of shorting pin at the optimal position and then, combining both technologies.The integration of an MTM structure on the superstrate layer makes the antenna circularly polarized with broad axial ratio bandwidth and impedance bandwidth, and splendid reflection coefficient. Integrating a shorting pin, which connects the substrate layer to the ground plate, makes the antenna dual-band, meliorate impedance matching, produces consequential gain enhancement, low SAR and shows robust CP behavior at both frequency bands and aids in further miniaturization. Backscatter radiation and the comprehensive complexity of the antenna is diminished by slot-less ground plate. The proposed technologies simplify the design of dual-band circularly polarized compact and wideband implantable antenna which makes it competent for efficacious implantable applications. Blueprint of the proposed antenna configuration and correlated mensuration are delineated.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114268586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Development of Smart Cart System using Artificial Intelligence","authors":"Anushka, Vishu Mishra, Shivani Bhardwaj, Rashmi Vashisth","doi":"10.1109/ISPCC53510.2021.9609507","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609507","url":null,"abstract":"This paper presents the development of smart billing cart system designed for shopping in supermarkets. The cart is intended to generate the bill automatically as well as follow the customer by itself. This paper is based on Arduino Uno microcontroller, RFID reader for reading the tags associated with each product, load cell for checking the changes in the weight of the cart, IR sensor and DC motors for automated movement of the cart and LCD for display.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131182701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. V. Kumar, K. K. Srinivas, P. Anudeep, N. Yadav, G. Kumar, P. A. Harsha Vardhini
{"title":"Artificial Intelligence Based Algorithms for Driver Distraction Detection: A Review","authors":"B. V. Kumar, K. K. Srinivas, P. Anudeep, N. Yadav, G. Kumar, P. A. Harsha Vardhini","doi":"10.1109/ISPCC53510.2021.9609349","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609349","url":null,"abstract":"World Health Organization gave a report global road safety. Road accidents have turned to be more dangerous and they became the eighth most important reason for death. Out of this one fifth of them are caused due to the negligence of the driver. We discuss about the different types of algorithms which are more efficient based on the features that are detected by the algorithms. Comparison of algorithms is done to know the algorithms which work well for the specific set features detection. In driver distraction, there are many features like pupil diameter, hands location, head location etc., which are needed to be detected and predict the type of distraction. Each algorithm uses different kind of Artificial Intelligence models and does the predictions based on the features.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128108623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}