D. Ram Nivas, M. Kathirvelu, M. Ishwarya Niranjana, R. Krishnaraj, J. Dhanasekar
{"title":"Wireless Electronic Notice Board and Attendance Monitoring System","authors":"D. Ram Nivas, M. Kathirvelu, M. Ishwarya Niranjana, R. Krishnaraj, J. Dhanasekar","doi":"10.1109/C2I456876.2022.10051245","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051245","url":null,"abstract":"Educational Technology is growing field and it is playing an effective vital role in current pandemic situation there by providing assistance by making learning happier and interesting. Several researches are being carried out to improve the teaching and learning practices. In addition to this care should be taken in continuous monitoring and information sharing for ensuring effective participation of the students. Institutions and public utility places use notice boards for sticking various notices for daily information dissemination and data clarification. Day to day updating is difficult and time consuming. Also, a separate personal assistance is required to take care of these notices. These notice boards need to be taken care to prevent it from false data publication and prevention of damage. A raspberry pi based wireless electronic notice is implemented with a projector-based display and voice output. In addition to this, telegram application is used for sending authorized information to the user. An attendance monitoring system is implemented by adapting the technology of RFID. The result of this attendance monitoring system is compared with that of the object detector-based attendance monitoring system implemented with the help of MATLAB. The results seem to be satisfactory there by being a pathway for adapting new technologies in educational institution.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Copyright and Consent Form","authors":"","doi":"10.1109/c2i456876.2022.10051417","DOIUrl":"https://doi.org/10.1109/c2i456876.2022.10051417","url":null,"abstract":"To ensure uniformity of treatment among all contributors, other forms may not be substituted for this form, nor may any wording of the form be changed. This form is intended for original material submitted to the IEEE and must accompany any such material in order to be published by the IEEE. Please read the form carefully and keep a copy for your files.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Chitra, V. K, Siddharth Shendge, V. T. Reddy, Tarun Pati, Sourav Kumar
{"title":"Hardware Implementation of Z-Source Inverter for Commercial Applications","authors":"K. Chitra, V. K, Siddharth Shendge, V. T. Reddy, Tarun Pati, Sourav Kumar","doi":"10.1109/C2I456876.2022.10051367","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051367","url":null,"abstract":"This study gives an overview of z-source inverter and the methods to control it. The z-source inverter (ZSI) shown here is for dc-dc conversion, thus acting like a voltage source inverter. Here the technique of z-source inverter can be used for even ac-ac, ac-dc conversions. Since its invention the impedance-source inverter has presented us with many pros when compared to classical voltage or current-source converters. The simulation of a single-phase $mathrm{Z}$ Source inverter controlled by pulse width modulation is illustrated using MATLAB to demonstrate the inverter's fundamental operation, and hardware findings are also reported in this work.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of Incremental boosting based Transfer Learning in Deep CNN","authors":"G. S, H. R","doi":"10.1109/C2I456876.2022.10051386","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051386","url":null,"abstract":"Imbalanced datasets are one of the important research constraints available in image classification. Due to which the classifier performance is greatly reduced leading to overfitting and under fitting problems. However, this is greatly applicable for better well-balanced datasets. Adaboost classifier model is one such technique proven for its accuracy both in terms of margin theory and in terms of statistical point of view. Many novel approaches use boosting and bagging methods to improve the performance of classifier models. In this research, we are focusing on the effectiveness of boosting procedures in deep Convolution neural network (deep CNN) for classification and modification of ensemble approaches are done with transfer learning techniques. The Computational Complexity of the classifier affects the performance accuracy of the same. Based on the above idea, the input data for training the model is subsampled and reweighted for better efficiency and less complexity. Performance metrics used to analyze the performance of simple AdaBoost classifier, boosted GMM, boosted SVM, incremental boosting based transfer learning approaches using GMM and SVM with and without subsampling procedures are the accuracy, the training time, the predicting time of testing, the volume of the model, and the loss function. Along with the above-said metrics, three more essential parameters, namely the Jaccard index, Dice coefficient, and Mathews correlation coefficients, are used. Based on the experiments carried over the benign and malignant melanoma images from the ISIC database, the boosting based transfer learning approach in deep CNN gives an accuracy of 99.19% and confusion matrix created over the classifier has given the sensitivity of 98.46%.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115984991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Copyright and Consent Form","authors":"","doi":"10.1109/c2i456876.2022.10051437","DOIUrl":"https://doi.org/10.1109/c2i456876.2022.10051437","url":null,"abstract":"To ensure uniformity of treatment among all contributors, other forms may not be substituted for this form, nor may any wording of the form be changed. This form is intended for original material submitted to the IEEE and must accompany any such material in order to be published by the IEEE. Please read the form carefully and keep a copy for your files.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116003332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Copyright and Consent Form","authors":"","doi":"10.1109/c2i456876.2022.10051617","DOIUrl":"https://doi.org/10.1109/c2i456876.2022.10051617","url":null,"abstract":"To ensure uniformity of treatment among all contributors, other forms may not be substituted for this form, nor may any wording of the form be changed. This form is intended for original material submitted to the IEEE and must accompany any such material in order to be published by the IEEE. Please read the form carefully and keep a copy for your files.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116454393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Detection of Diabetic Retinopathy using Deep Learning in Retinal Fundus Images: Analysis","authors":"Manjushree R, Bhoomika D, Rekha R. Nair, T. Babu","doi":"10.1109/C2I456876.2022.10051419","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051419","url":null,"abstract":"Diabetes frequently results in diabetic retinopathy (DR), which develops retinal lesions that impair vision. It can cause blindness if not caught in time. Treatments simply maintain vision because DR is an irreversible process. The risk of blindness can be considerably decreased with early DR detection and treat- ment. The traditional diagnosis of DR retinal fundus pictures by an ophthalmologist is time-consuming, labor-intensive, expensive, and prone to error in comparison to computer-assisted diagnostic techniques Recent advances in deep learning have propelled them to the top of the list of the most widely used methods. Deep learning is particularly effective at classifying and analysing medical images.Convolutional neural networks, a more common and effective deep learning technique, handle medical images very effectively. The proposed model makes use of Inception V3which is Convolutional Neural Network that provides accuracy of 93% which is the highest accuracy when compared to AlexNet, DenseNet121, RestNet50 and EfficientnetBO in detecting diabetic retinopathy.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124766122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of Biometric Based Secure User Authentication Protocol for IoT Applications","authors":"P. Ramalingam, P. Pabitha","doi":"10.1109/C2I456876.2022.10051341","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051341","url":null,"abstract":"In the 21st century various Biometric based user authentication schemes for Internet of Things network applications are evolving. As a part, Vinoth et al. proposed an Biometric authenticated key agreement scheme for industrial IoT. As the IoT environments are rapidly connecting with various public networks for the communication and data transfer, there are high chance for security attacks. The schemes used in these kind of IoT networks needs to maintain the security with lightweight operations. Validation of existing schemes are highly important to protect the environment. We cryptanalysis the Vinoth et al.'s scheme and identified a security design flaw. Their scheme is failed to protect the biometric and not achieving the key freshness. As a result, their scheme is vulnerable to Biometric template attack, user impersonation attack and failed to meet the user anonymity security feature. This work proposes a technique to address the flaws identified. The proposed scheme has been implemented and verified using the AVISPA simulator.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124003710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Copyright and Consent Form","authors":"","doi":"10.1109/c2i456876.2022.10051270","DOIUrl":"https://doi.org/10.1109/c2i456876.2022.10051270","url":null,"abstract":"To ensure uniformity of treatment among all contributors, other forms may not be substituted for this form, nor may any wording of the form be changed. This form is intended for original material submitted to the IEEE and must accompany any such material in order to be published by the IEEE. Please read the form carefully and keep a copy for your files.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"268 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114098733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Insight to High Gain DC-DC Power Converters for Low Voltage PV System","authors":"V. Devi, K. Kumar","doi":"10.1109/C2I456876.2022.10051222","DOIUrl":"https://doi.org/10.1109/C2I456876.2022.10051222","url":null,"abstract":"Traditional power generation cannot meet rising cumulative load demand, resulting in power shortages in many countries. To obtain optimal electrical power, researchers work on non-conventional energy sources. DC-DC converters at the most important site improve power conversion efficiency, allowing for maximum electrical power extraction. The current study looks at trends in non-isolated converters with various power components and voltage gain parameters. To choose the best converter for low voltage renewable uses, the performance of non-isolated converters is compared and presented.","PeriodicalId":165055,"journal":{"name":"2022 3rd International Conference on Communication, Computing and Industry 4.0 (C2I4)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126226490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}