{"title":"Deep Learning to Detect Plant Diseases","authors":"Rajiv Kumar","doi":"10.1109/ISPCC53510.2021.9609389","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609389","url":null,"abstract":"Economy of any nation shares a major part with the agriculture and crop production. Good yield is badly impacted by the diseases in plants and crops. Due to involvement of manual inspection on majority, poses a challenge to identify the plant diseases and in turn the crop yield is reduced, or quality is affected. Monitoring plants and crops spread over a large area is tedious task for the farmers or cultivators. Sometimes, the disease may not be known to the farmer. The present paper presents a system involving a standard smartphone to predict the plant diseases using machine learning approach. The proposed system collects data, as plant disease images, and that dataset is used to detect various diseases of plants and crop. It potentially benefits the cultivators as it is capable to detect the diseases without minimal human intervention with prompt results. Further, the proposed technique helps in detecting diseases during its early stage to safeguard the yield. Neural network-based model is trained to detect plant diseases and the crop types. During test results, the model achieves an accuracy of 96.78% in detecting diseases which is of significant use to the cultivators. Further, the system recommends the possible pesticides to use in every category of the disease.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"76 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114036703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lovejit Singh, Sarbjeet Singh, N. Aggarwal, Ranjit Singh, Gagan Singla
{"title":"An Efficient Temporal Feature Aggregation of Audio-Video Signals for Human Emotion Recognition","authors":"Lovejit Singh, Sarbjeet Singh, N. Aggarwal, Ranjit Singh, Gagan Singla","doi":"10.1109/ISPCC53510.2021.9609528","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609528","url":null,"abstract":"Due to the significance of human behavioral intelligence in computing devices, this work focused on the facial expressions and speech of humans for their emotion recognition in multimodal (audio-video) signals. The audio-video signals consist of frames to represent the temporal activities of facial expressions and speech of humans. It become challenging to determine the efficient method to construct a spatial and temporal feature vector from the frame-wise spatial feature descriptor to describe the facial expressions and speech temporal information in audio-video signals. In this paper, an efficient temporal feature aggregation method is presented for human emotion recognition in audio-video signals. The Local Binary Pattern (LBP) feature of facial expressions and Mel Frequency Cepstral Coefficients (MFCCs) and its $Delta+DeltaDelta$ of speech are computed from each frame. The experiment analysis is performed to decide the efficient method for temporal feature aggregation, i.e., sum normalization or statistical functions, to construct a spatial and temporal feature vector. The multiclass Support Vector Machine (SVM) classification model is trained and tested to evaluate the performance of temporal feature aggregation method with LBP features and MFCCs and its $Delta+DeltaDelta$ features. The Bayesian optimization (BO) method determines the optimal hyper-parameters of the multiclass SVM classifier for emotion detection. The experiment analysis of proposed work is performed on publicly accessible and challenging Crowd-sourced Emotional Multimodal Actors-Dataset (CREMA-D) and compared with existing work.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114873680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Comparative analysis of Mux Tree using Different Low Power Design Techniques","authors":"Kanika Sharma, Ashwni Kumar","doi":"10.1109/ISPCC53510.2021.9609494","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609494","url":null,"abstract":"The work present in this paper depicts the design and thorough comparative analysis of a digital circuit namely, 4X1 mux tree (data selector) using different Low Power design techniques i.e., Standard body bias technique, DTMOS, FGMOS, Quasi-FGMOS(QFGMOS). Ultra-Low power, High Speed and Low voltage is the need of the hour in the VLSI industry. So, this paper further investigates the performance characteristics and scrutiny of each technique described above to ensure the tradeoff between various parameters in best possible way as per the requirement. The simulations in the proposed paper are carried out in LTSPICE using TSMC 180nm technology by keeping all the design parameters such as aspect ratio, input voltage, bias voltage same. Power dissipated, Output voltage, delay, PDP and EDP are also calculated for each technique based circuitry.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122869668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review on Clustering in WSN: Optimization Techniques and Future Research Challenges","authors":"Abha Sharma, Prasenjit Das, R. B. Patel","doi":"10.1109/ISPCC53510.2021.9609420","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609420","url":null,"abstract":"Wireless Sensor Networks (WSNs) has become an attraction for various academic researchers and technical communities in these modern times. The aim is to work upon key issues like better data communication, maintain network load, reliability, scalability, and augment security issues. Clustering has its own significance in WSN as it plays a vital role in energy utilization, which is one of the key concerns in any kind of network. A cluster is formed by set of nodes, the formed cluster is responsible for improving the routing structure that reduces network delay and create a network with better efficiency. Nodes in a cluster come together on the basis of fitness function. The proposed review focuses on clustering aspects like objectives that are facilitated, characteristics, taxonomy for cluster formation and classification of the optimization techniques used to enhance the clustering process in WSNs which have been proposed in previous years.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129890707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption Algorithms based on Security in IoT (Internet of Things)","authors":"Amanpreet Kaur, Gurpreet Singh","doi":"10.1109/ISPCC53510.2021.9609495","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609495","url":null,"abstract":"The Internet is evolving everywhere and expanding its entity globally. The IoT(Internet of things) is a new and interesting concept introduced in this world of internet. Generally it is interconnected computing device which can be embedded in our daily routine objects through which we can send and receive data. It is beyond connecting computers and laptops only although it can connect billion of devices. It can be described as reliable method of communication that also make use of other technologies like wireless sensor, QR code etc. IoT (Internet of Things) is making everything smart with use of technology like smart homes, smart cities, smart watches. In this chapter, we will study the security algorithms in IoT (Internet of Things) which can be achieved with encryption process. In the world of IoT, data is more vulnerable to threats. So as to protect data integrity, data confidentiality, we have Light weight Encryption Algorithms like symmetric key cryptography and public key cryptography for secure IoT (Internet of Things) named as Secure IoT. Because it is not convenient to use full encryption algorithms that require large memory size, large program code and larger execution time. Light weight algorithms meet all resource constraints of small memory size, less execution time and efficiency. The algorithms can be measured in terms of key size, no of blocks and algorithm structure, chip size and energy consumption. Light Weight Techniques provides security to smart object networks and also provides efficiency. In Symmetric Key Cryptography, two parties can have identical keys but has some practical difficulty. Public Key Cryptography uses both private and public key which are related to each other. Public key is known to everyone while private key is kept secret. Public Key cryptography method is based on mathematical problems. So, to implement this method, one should have a great expertise.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116407517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of TCP Queues: Effect of Buffer Size and Round Trip Time","authors":"Lokesh Bommisetty","doi":"10.1109/ISPCC53510.2021.9609523","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609523","url":null,"abstract":"In this paper, we demonstrate the effect of buffer size and the round trip time (RTT) on the statistical, dynamical properties of the transport control protocol (TCP) flows. We analyze the queue metrics like link utilization, queue size and packets lost with respect to buffer sizes and RTT. To analyze the network performance, we consider three buffer regimes: large buffer, intermediate buffer, and small buffer. In large buffer regime, we consider the delay bandwidth product gives that buffer size. The intermediate buffer size is determined by scaling the size of large buffer with the square root of the TCP flows using that link. In small buffer regime, fixed length buffer is considered. We study the aggregate traffic flow behaviour of multiple TCP flows and the compound TCP models of traffic flows. The behaviour of fluid models of traffic flows is studied to analyze the dependency of stability, goodput and the magnitude of oscillations when the model is unstable. We perform the packet level simulations of single bottleneck and two bottle neck queues to study the performance parameters like queue size, dropped packets and link utilisation for different buffer sizes and RTTs. We suggest that the buffer sizes can be much smaller than the buffer sizes recommended currently with the support of statistical and control theoretical analysis.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of Data Analysis in Higher Education","authors":"Sidharth Gautam","doi":"10.1109/ISPCC53510.2021.9609509","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609509","url":null,"abstract":"The reason and worth of higher education is changing. Innovation is reinforcing the capacities of foundations to confront the new difficulties. Advanced education approaches domains of information which can be utilized to further develop dynamic. The utilization of Big Data and investigation in advanced education is generally new region. The pertinence of examination is significantly seen in numerous spaces and advanced education is the same. This paper inspects the job of Big Data and examination in advanced education. In this paper an attempt has been made to discuss the role of techniques of data analysis in higher education system.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127249138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Challenges and Issues in IoT","authors":"Sanjeev Kumar, Sukhvinder Singh Deora","doi":"10.1109/ISPCC53510.2021.9609486","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609486","url":null,"abstract":"Internet of Things (IoT) is sometimes called the internet of devices. In IoT, environment devices are connected with the help of gateways. All required information can be accessed by a device with the help of internet gateways from any network. So, it is very challenging to transfer data in open surroundings where the security of data is very problematic. In this paper architecture of IoT, security challenges, security requirements, and future security challenges of IoT have been discussed in detail, after that, a comparative analysis of different security techniques has been presented. At last literature review on different papers of security in IoT has been presented with pros and cons.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126678587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Communication Technologies for Internet of Things and Precision Agriculture: A Review","authors":"D. Singh, R. Sobti","doi":"10.1109/ISPCC53510.2021.9609421","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609421","url":null,"abstract":"Precision Agriculture is an important application of the Internet of Things (IoT). Precision Agriculture is the solution to the food shortage that may hit the world due to the large population, about 9.5 billion by 2050, and other environmental impacts like water scarcity due to conventional agricultural practices. IoT provided field and weather information to farmers and relies on communication technologies for the sharing of information. Wireless communication technologies provide the means to transmit the collected information in an IoT network. ZigBee, RFID, NFC, Bluetooth, BLE, LTE, 6LoPWAN, Sigfox, and LoRa are the major technologies deployed in IoT for agriculture. Wireless communication technologies differ in their data communication range and power efficiency. Some are suitable for short-distance monitoring while few offer the long communication range for monitoring and control. Various available wireless communication technologies are revied in this article for their technical specifications and their applicability in Precision Agriculture.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134190563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Review on Encryption based Open Source Cyber Security Tools","authors":"Ritika Sharma, Sarishma Dangi, P. Mishra","doi":"10.1109/ISPCC53510.2021.9609369","DOIUrl":"https://doi.org/10.1109/ISPCC53510.2021.9609369","url":null,"abstract":"With the worldwide migration of workloads on internet and doud based platforms, maintaining security has become a major bottleneck in business workflows. Open source security tools are widely available for maintaining network security, endpoint security, system security etc. However, there exists a gap in adoption of these tools amidst end users. In This work, we have reviewed encryption based open source cybersecurity tools for a detailed study and comparison under different categories. Numerous open source tools are investigated which can be used by cyber security industries, academia, hackers and business institutions across the world. A comprehensive review of the tools is provided so as to guide anyone who wants to explore encryption based tools in today’s rapidly evolving digital world.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134053158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}