{"title":"Procedding Cover","authors":"","doi":"10.1109/icetet-sip-2254415.2022.9791774","DOIUrl":"https://doi.org/10.1109/icetet-sip-2254415.2022.9791774","url":null,"abstract":"","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127464967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of CNN Architectures for Maize Crop Disease","authors":"Rakshit Agrawal, Vinay Singh, Mahendra Kumar Gourisaria, Ashish Sharma, Himansu Das","doi":"10.1109/ICETET-SIP-2254415.2022.9791628","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791628","url":null,"abstract":"In the current scenario, the Agriculture industry is regarded as the leading industry for society, serving all the needs for the betterment of humanity. Plants are considered to be one of the primary sources of humanity's energy production concealed with nutrients, medicinal cures, etc. Any harm or disease due to exposure of pathogens, viruses, bacteria, etc. to the plants during agriculture leads to the downfall of productivity making it a crucial concern to prevent such diseases and take necessary steps to avoid them. Making accurate identification of such fatal diseases is an important step for the industry as well as for the farmers. In our study, we have implemented fifteen different Convolutional Neural Networks (CNN) which takes plant leaf image as an input source. These architectures have different layers, neurons per layer, optimizers, etc. Our goal is to provide a detailed comparative analysis between the various frameworks based on accuracy, precision, Least Validation Cross-Entropy Loss (LVCEL), etc. parameters in the most effective way. From the experimental results, we found the sixth architecture to be the most accurate model. With the modification of convolutional layers and the use of the correct optimizer, results can be improved to a great extends.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"59 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126079621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment Analysis Using K Means Clustering on Microblogging Data Focused on Only the Important Sentiments","authors":"Agashini V. Kumar, K. Meera","doi":"10.1109/ICETET-SIP-2254415.2022.9791723","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791723","url":null,"abstract":"The aim of this paper is to perform sentiment analysis on a microblogging data (Twitter data is taken for the experiment) using k means clustering algorithm. The main intention here is to study the conditions that may favor or not, sentiment analysis using k means clustering considering only two major sentiments as positive and negative. The other sentiments which are not of major interest are made into another cluster and the accuracy of the clusters thus formed is analyzed and meaningful conclusions from the same can be obtained.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129316390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Security Barrier (ISB): Hide valuable information in image using machine learning","authors":"Pranay Maske, Kunal Pardhi, Shubham Hatzade, Rakesh Sharma, Sampada S. Wazalwar","doi":"10.1109/ICETET-SIP-2254415.2022.9791749","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791749","url":null,"abstract":"People have a addictions of sharing their daily activities on story, posts, chatting or snap in form of an image on social media. Sometimes image content information includes the date of birth, addresses, phone no, Aadhar no, PAN no, or QR code.if someone shares too much information, then hackers can harvest this information and use it for illegal purposes and like government and Businesses secret information leak, due to lack of security or maliciously, causes big costs in money, a distinction of business, and national security. In this paper, we present software/tool for hiding such kind sensitive/private data of users while shearing on the world of internet. ISB is a software/tool that creates a barrier between hackers and public it recognizes our sensitive information from image/document and hide or encrypt them. An ISB provides secured image with 95.5% of accuracy The final output is completely secure for sharing anywhere on Internet/social media platforms.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128141827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey on Power Allocation in PD-NOMA for 5G Wireless Communication Systems","authors":"Prasheel N. Thakre, S. Pokle","doi":"10.1109/ICETET-SIP-2254415.2022.9791576","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791576","url":null,"abstract":"Non-Orthogonal Multiple Access (NOMA) is a proposed technology for 5G NR (New Radio) networks in the future to increase capacity, user fairness, spectrum efficiency, and mass connectivity. NOMA permits several users to share identical radio resources like time slots, subcarriers, or spreading code simultaneously. Therefore, in designing NOMA the main challenge is to select resource allocation algorithms since user pairing and power allocation go hand in hand. NOMA is a general framework that can be easily blended with several recently proposed 5G multiple access schemes. In this survey paper, the NOMA scheme is discussed and thereby provides an overview of the algorithms designed for optimizing power allocation in the power domain NOMA, considering three different parameters: Max-Min Fairness(MMF), maximizing Sum Rate, and maximizing Energy Efficiency in different radio networks.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121839601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Approach to Enhance Security and Friendliness of Visual Secret Sharing Scheme","authors":"V. Panchbhai, S. Varade","doi":"10.1109/ICETET-SIP-2254415.2022.9791815","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791815","url":null,"abstract":"In Block based Progressive Visual Secret Sharing (BPVSS) scheme, secret image will be recovered block by block from noise-like and meaningful shares. It is found that only meaningful shares are user-friendly. But the meaningful shares generated through BPVSS techniques show poor visual quality so it is suspicious to intruder while transmission over internet. Thus, this paper proposes a meaningful share generating strategy based on BPVSS and LSB-based steganography to solve the above-mentioned problem with less processing power and time. The proposed system delivers superior standard performance parameter readings and has various advantages, including (1) it is suited for grayscale as well as color secret images, (2) the contrast of the recovered image is the same as the original secret image, and (3) computational power and time required to recover secret image is very less.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130242689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Punjabi Speech Emotion Recognition using Prosodic, Spectral and Wavelet Features","authors":"Chaitanya Singla, Sukhdev Singh","doi":"10.1109/ICETET-SIP-2254415.2022.9791593","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791593","url":null,"abstract":"A rapid advancement can be seen in affective computing, speech emotion recognition (SER) and human computer interaction, SER has been getting more consideration. English, German and Indian are all popular languages that can be used for SER. Due to the lack of Punjabi speech emotion data, very few researchers have tried to implement Punjabi SER systems. Despite the fact that Punjabi is one of the most commonly spoken and understood languages over the web, there has not yet been a Punjabi speech emotion database. This work introduces a semi-natural Punjabi speech emotions database that was compiled from several TV series and Punjabi movies. This database contains utterances of male and female actors, and covers four emotions: happy, sad, neutral, and happy. The database is used to compute prosodic, wavelet and spectral features for emotion recognition. Wavelet parameters, in addition to the Mel frequency Cepstral (MFCC), which are widely used for SER, are also taken into account. The extracted features can also be used to classify emotions.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"139 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning based Distributed Dynamic Spectrum Access","authors":"Sonia, S. Singh","doi":"10.1109/ICETET-SIP-2254415.2022.9791818","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791818","url":null,"abstract":"With innovations in the field of wireless communication many advanced technologies are coming up keeping in point data rates and mobile traffic so that users can efficiently communicate. Different coexistence scenarios between Wi-Fi and long-term evolution technique as 4G-LTE, spectrum-sensing techniques and spectrum-access method have been studied, proved, and simulated so far. This paper is mainly focused on performing spectrum-access in dynamic and distributed manner. This can be achieved using deep-reinforcement-learning model. It gives us information about overall channel-utilization and response of model applying different policy methods. In the proposed methodology policy functions as Boltzmann distribution, epsilon greedy, upper confidence bound, and Thompson sampling are used to obtain a reward in learning algorithm. Results shows that Thompson sampling policy performs superior than others.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133050902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security of E-healthcare data using DWT-SVD based Hybrid watermarking","authors":"K. Singh, Pushpanjali Singh, H. Singh","doi":"10.1109/ICETET-SIP-2254415.2022.9791599","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791599","url":null,"abstract":"Due to advancement in technology nowadays, it is easy to manipulate and produce illegal multimedia data. As a consequent, different strategy of information security has been created by the researchers and specialists every day. Digital watermarking is one of the various techniques used these days to secure the data in efficient manner. In this data has been embedded using a suitable algorithm and watermark. Again at the receiving end watermark has been extracted for the reconstruction of original data. Watermarking can be done using spatial domain or transform domain. In this paper watermarking has been done using transform domain techniques on digital images. The proposed method includes DWT-SVD hybrid watermarking technique in addition to watermark generation. This method has been performed on medical images for securing the data. The original image is firstly processed by using DWT followed by SVD. The results have been tested by applying various attacks for the robustness of algorithm. The quality of an image can be evaluated by different parameters as PSNR, SNR and SSIM. The proposed method achieved a good value of PSNR and SSIM.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133105433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Three Stage Ku-Band GaN HEMT Power Amplifier","authors":"Ravinder Kumar, Sukwinder Singh","doi":"10.1109/ICETET-SIP-2254415.2022.9791701","DOIUrl":"https://doi.org/10.1109/ICETET-SIP-2254415.2022.9791701","url":null,"abstract":"This paper describes the design of a Ku band power amplifier using GaN HEMTs. To obtain high efficiency, matching networks are incorporated into power amplifier. In order to design matching networks, the optimum source and load impedances are determined by the load pull analysis. As from single and two stage Ku band PAs do not provide the required gain for our requirement, a three stage Ku band PA is designed. At 13.63 GHz, the designed power amplifier provides more than 37.7dBm output power with large signal gain greater than 37dB and power added efficiency close to 40%.","PeriodicalId":117229,"journal":{"name":"2022 10th International Conference on Emerging Trends in Engineering and Technology - Signal and Information Processing (ICETET-SIP-22)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}