{"title":"An Indirect Method to Estimate Sweet Lime Weight through Machine Learning Algorithm","authors":"V. Phate, R. Malmathanraj, P. Palanisamy","doi":"10.1109/ICCMC48092.2020.ICCMC-00038","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00038","url":null,"abstract":"A fast and indirect method of weighing the sweet lime fruit developed based on the computer vision coupled with machine learning algorithm is investigated in this research work. The developed computer vision system (CVS) has been used to analyze the sweet lime image database. The images have been processed using the developed algorithm to extract seven geometrical attributes. The support vector machine regression (SVMR) modelling technique has been utilized to develop the model for estimating the weight of fruit samples under consideration. Eight different SVMR models have been developed in two SVM type for different kernel type. Relevant statistical analysis and comparison of the developed model is also presented. Finally, the type 2 SVMR model with RBF kernel has been recommended as the model with best performance during training ($R^{2}=$ 0.9867, RMSE = 5.26) and testing ($R^{2} =$ 0.9866, RMSE = 6.435) too. Thus, the presented work provides an indirect way for measuring sweet lime fruit size to estimate its weight. This will be helpful in the design and development of most of the post-harvest equipment.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115387983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Feature Extraction Techniques for Sentiment Classification","authors":"K. Kalaivani, S. Uma, C. Kanimozhiselvi","doi":"10.1109/ICCMC48092.2020.ICCMC-000126","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000126","url":null,"abstract":"Sentiment analysis is used for social media supervising. It is used to analyze comments, recommendations provided by the reviewers. Depending on this analysis, products will be purchased through either online or offline. Machine learning is an area of artificial intelligence which gives computers the capability to learn without using exceptional computation. Traditional machine learning algorithms used for feature extraction and sentiment classification leads to scalability and computational problems while dealing with a huge amount of data. Deep learning is a field of approach concerned with neural implementations. It is a nonscalable and accurate technique for sentiment classification, automatic feature extraction and dimensionality reduction. Machine learning techniques are easier to implement but give less accuracy compared to deep learning. Deep learning methods are complex to implement from a human point of view, but machines require complex structures to learn large data set easier.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127159222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fraud Detection and Prevention by using Big Data Analytics","authors":"Bineet Kumar Jha, G. Sivasankari, K. Venugopal","doi":"10.1109/ICCMC48092.2020.ICCMC-00050","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00050","url":null,"abstract":"A retail sector is a group of organization or people who sell goods or services for gaining income. Fraud is wrongful or criminal activities for the economic and personal benefits. Fraud detection is finding actual or expected fraud which takes place in an organization and in the retail market is one of the challenging aspects. Fraud is mischievous activities occur in retail sector includes shoplifting, skimming, replicating cards from skimmed data, counterfeiting, bar code or POS(Point-of-Sale) manipulation, contamination, mislabeling, substitute cheaper ingredients instead of high-quality ingredients. Fraudulent activities occur in the retail sector by both consumer and supplier. Analyzing financial crimes related to fraudulent activities is difficult where traditional data mining techniques fail to address all of them. Big data analytics is used to identify an unusual pattern to detect and prevent fraud in the retail sector. Various predictive analytics tools are used to handle massive data and their pattern.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124887170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Enforcement of Context Aware System Security Protocols with the Aid of Multi Factor Authentication","authors":"S. Jose, P. Nayana, N. S. Nair","doi":"10.1109/ICCMC48092.2020.ICCMC-000138","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000138","url":null,"abstract":"In this paper, an attempt has been made to describe Kerberos authentication with multi factor authentication in context aware systems. Multi factor authentication will make the framework increasingly secure and dependable. The Kerberos convention is one of the most generally utilized security conventions on the planet. The security conventions of Kerberos have been around for a considerable length of time for programmers and other malware to Figure out how to sidestep it. This has required a quick support of the Kerberos convention to make it progressively dependable and productive. Right now, endeavor to help explain this by strengthening Kerberos with the assistance of multifaceted verification.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125181267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. J. Mathavan, K. G. L. Dinakara, P. G. S. G. Premathilaka, H. M. T. D. Herath
{"title":"Arduino based Hardware Implementation of Automatic Side Stand for Motor Bike","authors":"J. J. Mathavan, K. G. L. Dinakara, P. G. S. G. Premathilaka, H. M. T. D. Herath","doi":"10.1109/ICCMC48092.2020.ICCMC-000116","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000116","url":null,"abstract":"Usage of motor bike is preferred by most of the people for it is an easy way for transport and it needs a little space comparatively on parking. But when accidents happen, it causes severe injuries and sometimes deaths as well. There are many reasons for these accidents, internally and externally. Forgetting to lift up the side stand is one of the reasons and it could be avoided by certain technical aspects. This paper presents an automatic side stand for motor bikes, which could be lifted up while the bike starts moving and retrieve back when it stops. The design consists of sensors, relay switches and regulators which are controlled by Arduino UNO program. There is no need to additional energy source or any other complexity since the designed system uses the necessary power from the motor bike battery.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126176052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Insight into the Relevance of Word Ordering for Text Data Analysis","authors":"R. Menon, R. Akhil dev, Sreehari G Bhattathiri","doi":"10.1109/ICCMC48092.2020.ICCMC-00040","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00040","url":null,"abstract":"Sentence ordering and word ordering is always remaining as a critical task for natural language processing applications. It is expected that introduction of word order information will lead to improvements in document related tasks like keyword extraction, context identification, topic analysis, intent identification, summary generation, document classification, sentiment analysis, clustering etc. In this paper, we are maintaining the structure of the document data by using various deep learning techniques. Most of the techniques can be compared on the basis of vector similarity. The proposed research work helps to improve the accuracy on the basis of the order of word occurrence. We also compare different types of word ordering techniques to maintain the structure of the document. The obtained results indicate that Doc2Vec model outperforms Tfidf model in terms of word order similarity.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"State of Charge based Control Strategy for Battery Energy Storage System in DC Microgrid","authors":"Dipali Kataruka, S. Behera","doi":"10.1109/ICCMC48092.2020.ICCMC-00081","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00081","url":null,"abstract":"In order to achieve proper bus voltage and desired power-sharing and charging/ discharging of Battery Energy Storage System (BESS) in consideration with the state of charge (SOC) of the battery, the control design is proposed. The design is mainly proposed for the bidirectional converter of BESS in a DC Microgrid (MG). The proposed controller employs the locally obtained measurements of battery voltage as a state in control design, thereby keeps aside the use of high bandwidth communication. On sudden failure of the grid, it must be compensated by other sources in the MG and continuous supply to the load is a must. Thus the reliability of the system is achieved by operating the MG employing mode switching in between three modes: power regulation mode (PRM), constant voltage (CV) mode and voltage regulation mode (VRM) implementing control scheme of BESS. Transient performance validation is done by simulating different system disturbances such as accidental grid isolation and uncertain loading conditions taking into account the line parameters in the transmission line. To show the proof of the proposed concept of the control strategy, simulation results are provided.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Vani, R. N. Raajan, D. Haretha Winmalar., R. Sudharsan
{"title":"Using the Keras Model for Accurate and Rapid Gender Identification through Detection of Facial Features","authors":"A. Vani, R. N. Raajan, D. Haretha Winmalar., R. Sudharsan","doi":"10.1109/ICCMC48092.2020.ICCMC-000106","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000106","url":null,"abstract":"As the need for person-aligned, effective, and ethical structures emerges, automatic identification of gender is gaining interest in the era of machine-man interactions. Most of the systems for gender detection were analysed using textual or audiovisual sources. Far too many suggested different approaches for automatic identification of gender using the characteristics acquired from people’s bodies and/or behaviours. But the accuracy has always been a question or a drawback in automated gender detection. In the proposed research work, First, the faces and the facial features which includes eyes, mouth, and nose are detected using Haar Cascade based on Viola-Jones face detection algorithm. Before, the gender detection, the noise is reduced by applying adaptive filters, thereby increasing the accuracy. The obtained facial features are given as the input or test data to the neural network. The neural network is designed to obtain the features and acts as a classifier to detect the genders. Simply, the feature extraction and gender detection is performed using the open source neural network called keras.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122668706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VLSI Implementation of Turbo Coder for LTE using Verilog HDL","authors":"Akshaya V, Sreehari K N, Anu Chalil","doi":"10.1109/ICCMC48092.2020.ICCMC-00051","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00051","url":null,"abstract":"Turbo codes are error correction codes that are widely used in communication systems. Turbo codes exhibits high error correction capability as compared with other error correction codes. This paper proposes a Very Large Scale Integration (VLSI) architecture for the implementation of Turbo decoder. Soft-in-soft out decoders, interleavers and deinterleavers is used in the decoder side which employs Maximum-a-Posteriori (MAP) algorithm. The number of iterations required to decode the information bits being transmitted is reduced by the use of MAP algorithm. For the encoder part, this paper uses a system which contains two Recursive convolutional encoders along with pseudorandom interleaver in encoder side. The Turbo encoding and decoding is done using Octave, Xilinx Vivado, Cadence tools. The system is implemented and synthesized in Application Specific Integrated Circuit (ASIC).Timing analysis has been done and GDSII file has been generated.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122696730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HVDC based Power Loss Reduction and Estimation of Power Transmission","authors":"P. Sharma, A. Kori","doi":"10.1109/ICCMC48092.2020.ICCMC-000180","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000180","url":null,"abstract":"This research work proposes a synchronous air conditioning dc power stream conspire through similar lines that are used for transmission to enjoy the benefits and as well as enhance the steadiness. Just the fundamental thought is proposed alongside the possibility study utilizing rudimentary lab work. The essential component is to underline chances of concurrent air conditioning in the DC transmission and its characteristic bit of leeway of intensity stream control. Control strategies dependent on particular symphonious end pulse width regulation (PWM) methods with energy unit framework offer the most reduced conceivable number of exchanging changes and enhances the SAF transmissions voltage level. The component additionally brings about the most reduced conceivable degree of converter exchanging misfortunes. Therefore, they are extremely alluring strategies for the HVDC-high voltage dc with the VSC-voltage-source convertor for power transmission frameworks.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121926323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}