{"title":"An Evaluation of the research knowledge within the community of electrical engineers","authors":"Deepika Chauhan, Mohammad Rashid Ansari","doi":"10.1109/IIHC55949.2022.10059729","DOIUrl":"https://doi.org/10.1109/IIHC55949.2022.10059729","url":null,"abstract":"Research is a form of artistic scientific inquiry. Research is the method involved with characterizing and redefining problems, forming hypotheses or proposed arrangements, assembling, coordinating, and investigating information, drawing allowances, and arriving at resolutions. At last, the ends are painstakingly tried to check whether they concur with the speculations that were initially proposed. Different kinds of questions will be prepared for this study and posed to the Electrical Engineering community participating in the educational and research fields at the University of Lahore. Survey data will be used to produce hypotheses and outcomes, and on the basis of the survey data, research expertise within the specialised community will be assessed. Relationships between various assumptions, conclusions, and outcomes will be drawn and charted. These derivations and plots will aid in strengthening the areas where the specialised community is lacking, and some suggestions will be based on engineering education research.","PeriodicalId":114883,"journal":{"name":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115239993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Application Based Authentication System","authors":"S. Akram, S. Joshi, Rajesh Deorari","doi":"10.1109/IIHC55949.2022.10059984","DOIUrl":"https://doi.org/10.1109/IIHC55949.2022.10059984","url":null,"abstract":"Authentication is one of the primary problems with system security. The key component of the access control process to prevent unauthorised users from accessing data and resources is authentication, which may be described as the act of verifying a user's identity. The validity of the user cannot be guaranteed by a static technique of authentication. This led to the development of more cutting-edge authentication techniques. To increase the system's security, two factor authentication was initially deployed, followed by multi factor authentication. Later, adaptive authentication was added and it also had some problems. When authenticating a user in this study, an unique collection of user features was taken into account. A performance optimization technique was included since this research takes many user factors into account, and it improved performance by 25%.","PeriodicalId":114883,"journal":{"name":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115603585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning based Driver Drowsiness Detection","authors":"D. Buddhi, Poonam Negi","doi":"10.1109/IIHC55949.2022.10059778","DOIUrl":"https://doi.org/10.1109/IIHC55949.2022.10059778","url":null,"abstract":"Sleepy and distracted drivers are increasingly being seen as major causes of fatal car accidents across the globe. This happens most often because the driver hasn't had enough sleep, but it may also be the consequence of untreated sleep disorders, substance abuse, or working odd hours. That's why it's crucial for cars to have systems in place to track and verify the identities of their drivers. Analyzing things like head orientation, eye movement, yawning, and ocular condition are crucial. This study suggests a mechanism for detecting driver fatigue by keeping track of the number of times the driver opens and closes their eyes and their lips. If the driver keeps his eyes closed for too long, an alarm will go off. In addition, if the driver is seen nodding off more than some few times, the vehicle's owner is contacted by e-mail to confirm that the driver is exercising precautions to prevent dozing off behind the wheel. The results of the system proposed in the paper on Deep learning technology of Dlib show that it is effective at detecting tiredness and thus decreasing the number of accidents that occur while driving. The system uses a CNN (Convolutional Neural Network) as its base algorithm for accurate detection and is implemented in MATLAB environments with a camera mounted. The suggested technique achieved a 99% success rate for video clip input.","PeriodicalId":114883,"journal":{"name":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121377600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bidirectional Linear Wireless Sensor Networks","authors":"S. Deepa","doi":"10.1109/IIHC55949.2022.10060775","DOIUrl":"https://doi.org/10.1109/IIHC55949.2022.10060775","url":null,"abstract":"As the sensor technology evolved into wireless stage, a lot of challenges came with it. Mainly the challenges with range, power, data rate and efficiency. Topologies like star, mesh and ring networks are used in the practical application of Wireless sensor networks. Each has its own advantages and disadvantages. Linear wireless sensor network has an important role in specific fields like pipeline monitoring and bridge state monitoring. To improve the wireless communication methods of the Linear Wireless Sensor Network(WSNs), we propose the Bidirectional Linear WSN. The Bidirectional Linear WSN is an improve linear communication method in which the network has two base stations and n number of sensor nodes in between them linearly. The Sensor nodes sends the sensed values to one of the Base stations through the multi-Hop method in a linear pattern. This method of communication in the WSN allows the design to be simple and cost effective.","PeriodicalId":114883,"journal":{"name":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127348617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Darwin Nesakumar, R. Priyadharshini, K. Pavithra, L. Sherin, K. Pavithra, P. Mugilan
{"title":"Emotional Based Playback System for Autism","authors":"A. Darwin Nesakumar, R. Priyadharshini, K. Pavithra, L. Sherin, K. Pavithra, P. Mugilan","doi":"10.1109/IIHC55949.2022.10060348","DOIUrl":"https://doi.org/10.1109/IIHC55949.2022.10060348","url":null,"abstract":"Nowadays Autism kids locate it hard to have interaction socially with human's feelings and make themselves isolated. This venture proposes Emotion detection for Autism spectrum sickness kids (ASD). It consists of python libraries Open CV, Haar-cascade approach to expect faces prediction. Conversely., maximum present techniques depend upon the detection of facial expressions of humans in social media systems which includes Snapchat makes use of facial reputation technology., and additionally detecting facial feelings from their Facial expressions within side the image. And for higher coordination of the kid's social behavior., right here a face is captured in real- time and feelings are expected via way of means of Facial expression recognition (FER). This proposed machine allows to enhance Autism kids' behavior as they regularly look at their facial expressions and predict the facial emotion. If the Predicted Facial Emotion is happy., then we will play some Interesting Audio to them using AT mega Microcontroller and DF Mini-Player., which will keep them relaxed and will help them to learn interactively. Along with that this system makes use of Galvanic Skin Response (GSR)., to find their stress level and monitoring it via over the Internet Using Node MCU (ESP8266-12E Microcontroller unit).","PeriodicalId":114883,"journal":{"name":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An implementation of intelligent routing scheme to find the efficient network management in Wireless sensor networks","authors":"Richa Dogra, Ritu Shree","doi":"10.1109/IIHC55949.2022.10060041","DOIUrl":"https://doi.org/10.1109/IIHC55949.2022.10060041","url":null,"abstract":"Sensor architecture is the combination of topology, access method and standards required to create a workable sensor. The choice of topology is determined, in particular, by the layout of the room where the LAN is used. Besides, of great importance is the cost of acquiring and installing sensor equipment, which is an important issue for the company, and here the price range is very large. A star topology is a highly productive system where each sensor, including the server, is connected to a central hub (HAB) through a separate nodes segment. The main advantage of such a sensor is its resistance to failures due to malfunctions in individual sensors or sensor nodes damage. The most important feature of information exchange in local sensors are the so-called access methods (access methods), which regulate the order in which workstations access sensor resources and exchange data. The listed resources can be used in peer-to-peer sensors and sensors with a dedicated server. However, in a peer-to-peer sensor, its shortcomings are immediately revealed. To work with the listed components, they must be installed on a workstation or connected to peripherals. If this station is disabled, all components and related services will not be available for shared use.","PeriodicalId":114883,"journal":{"name":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122850995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Investigation of the Distributed Health Monitoring System Using Wireless Sensor Networks","authors":"Y. Verma, Ranjul Rastogi","doi":"10.1109/IIHC55949.2022.10060535","DOIUrl":"https://doi.org/10.1109/IIHC55949.2022.10060535","url":null,"abstract":"In India, as in the rest of the world, cardiovascular diseases (CVD) are a leading killer. The majority of CVD deaths are unexpected, leaving no time to administer medical care. Precautions must constantly be taken to prevent sudden accidental fatalities. This is why electrocardiogram (ECG) monitoring and heart rate monitoring are so important for cardiac patients. Using a wireless sensor network (WSN), we demonstrate the three-tier architecture of a healthcare monitoring system prototype we've constructed to keep tabs on key patient vitals. Connecting various biosensors to an Arduino Nano board allows for the wireless transmission of recorded signals to a server, where they may be analyzed. Thing Speak is an internet of things (IOT) application that transmits data to remote servers where it may be accessed by doctors and caretakers. Smartphone alerts can be sent to carer's in the event of an emergency. Patients with heart conditions can benefit from the system, but it also has applications in caring for newborns and elderly people at home and in medical facilities. The technology is 95% accurate with a response time of 10 seconds.","PeriodicalId":114883,"journal":{"name":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114578281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Elakkia, M. Perarasi, S.P. Kalpana, Segu Sravana Keerthi, T. Vineetha
{"title":"Home Automation Using Augmented Reality","authors":"E. Elakkia, M. Perarasi, S.P. Kalpana, Segu Sravana Keerthi, T. Vineetha","doi":"10.1109/IIHC55949.2022.10059723","DOIUrl":"https://doi.org/10.1109/IIHC55949.2022.10059723","url":null,"abstract":"In recent years, people are less aware of consumed electricity, which plays a key role in managing the electricity use. However, consumers lack of attention and lack of information will also make massive impact in energy consumption and also, they may not be aware of faulty appliance which is consuming more electricity and also walk all the way to just to turn off the switch light will be sometimes so exhausting. So, we came up with a solution that whenever user opens our app and points his mobile camera on an appliance there is pop up showing up in the air which has all the energy data of your appliance with various parameters like real power, reactive power etc. and also a kind of information that user can understand to meet the energy savings. Not just stopped there in this app you can also control the appliances like TV, AC just by touching the virtual buttons floating in air just by simply sitting in the couch touching the buttons will make turning off the light rather than walking to the switch board Augmented reality playing a significant role in data visualization. The way we interact with the real world is changing day-by-day. Seeing Virtual objects in real world is going to change our lives better with its numerous applications.","PeriodicalId":114883,"journal":{"name":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121891639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The intelligent load optimization based safety system in electrical television network based on the starting loads","authors":"Mohit Kumar Jain, Sarabjit Singh","doi":"10.1109/IIHC55949.2022.10060340","DOIUrl":"https://doi.org/10.1109/IIHC55949.2022.10060340","url":null,"abstract":"One of the most interesting aspects of televisions is this type - pulse source electricity, very light and compact, when in good condition, gives good output characteristics. This article describes how to build a power source based on the MP-3-3. If you are engaged in repairing the USCD, you should know that if the MP-3-3 is plugged into the network without load, it will not work. A safety system is activated, which monitors not only overload, but also “under load”. Therefore, in order to use the MP-3-3 as a laboratory, that is, with various loads, it must be loaded. The proposed to load each MP-3-3 output sources with starting loads, but, as practice shows; There is no need to do so. The fact is that the protection system does not monitor the currents in all the secondary windings of the pulse transformer. It is important for her to get the volume in the second round. Then, for any second round, it doesn't matter. In addition, to bring the source into stabilization mode, it must be loaded with at least 20W, and with the resistance of the resistors indicated in L.1, in total, no more than 3–4 W is obtained. Bring the source to operating mode, this is not enough.","PeriodicalId":114883,"journal":{"name":"2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117006419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}