Venkatesh T, Mathavan N, Kothanda Thilipan V M, Murugan K
{"title":"CNN and MLSTM based Sentiment Analysis","authors":"Venkatesh T, Mathavan N, Kothanda Thilipan V M, Murugan K","doi":"10.46532/978-81-950008-1-4_010","DOIUrl":"https://doi.org/10.46532/978-81-950008-1-4_010","url":null,"abstract":"Dynamic of forthcoming purchasers are helped by item audits. For this, proposed different sentiment mining procedures. In this significant trouble lies in making a decision about direction of survey sentence. Issues of assumption order can be illuminated by utilizing a profound learning technique. In Mining of online client produced content, assumption investigation is a significant trouble. Audits of client are amassed in this work. It is obstinate substance's significant structure. Significant human endeavors are associated with conventional feeling arrangement strategies. Highlight designing and vocabulary development are its instances. Issues of estimation arrangement can be settled by utilizing a profound learning strategy. Without human endeavors, helpful portrayals can be adapted consequently by neural organization inherently. Accessibility of enormous scope preparing information characterizes the profound learning strategy's prosperity. For audit notion arrangement, novel profound learning structure is proposed in this work. Commonly accessible appraisals are utilized as frail management signal. There are two stages in this system. They are, elevated level portrayal getting the hang of, adding of grouping layer on top of inserting layer. For directed tweaking, marked sentences are utilized. Through rating data, sentences general supposition dissemination is caught utilizing this elevated level portrayal. Proficiency and predominance of proposed strategy is prepared by the experimentation done utilizing an Amazon's survey information.","PeriodicalId":191913,"journal":{"name":"Innovations in Information and Communication Technology Series","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114461208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Machine Learning Algorithms for Vision State Classification and Prediction Through Electroencephalogram (EEG) Signal","authors":"Devipriya A, Brindha D, K. A","doi":"10.46532/978-81-950008-1-4_093","DOIUrl":"https://doi.org/10.46532/978-81-950008-1-4_093","url":null,"abstract":"Eye state ID is a sort of basic time-arrangement grouping issue in which it is additionally a problem area in the late exploration. Electroencephalography (EEG) is broadly utilized in a vision state in order to recognize people perception form. Past examination was approved possibility of AI & measurable methodologies of EEG vision state arrangement. This research means to propose novel methodology for EEG vision state distinguishing proof utilizing Gradual Characteristic Learning (GCL) in light of neural organizations. GCL is a novel AI methodology which bit by bit imports and prepares includes individually. Past examinations have confirmed that such a methodology is appropriate for settling various example acknowledgment issues. Nonetheless, in these past works, little examination on GCL zeroed in its application to temporal-arrangement issues. Thusly, it is as yet unclear if GCL will be utilized for adapting the temporal-arrangement issues like EEG vision state characterization. Trial brings about this examination shows that, with appropriate element extraction and highlight requesting, GCL cannot just productively adapt to time-arrangement order issues, yet additionally display better grouping execution as far as characterization mistake rates in correlation with ordinary and some different methodologies. Vision state classification is performed and discussed with KNN classification and accuracy is enriched finally discussed the vision state classification with ensemble machine learning model.","PeriodicalId":191913,"journal":{"name":"Innovations in Information and Communication Technology Series","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130479440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. K, S. R, Jain Vinith P R, M. S, R. S., Supriya V
{"title":"Design and Analysis of STATCOM for Reactive Power Compensation using Three Phase Multilevel Inverter","authors":"P. K, S. R, Jain Vinith P R, M. S, R. S., Supriya V","doi":"10.46532/978-81-950008-1-4_004","DOIUrl":"https://doi.org/10.46532/978-81-950008-1-4_004","url":null,"abstract":"This paper proposes the concept of reactive power compensation with the aid of STATCOM (static synchronous compensators) and three phase multilevel inverter. The classification of multilevel inverters under three major types which are H-bridge inverter, flying capacitors-based inverter and diode clamped multilevel inverter. Among these multilevel inverters, the diode clamped type is stressed in this paper due to its capability to process 3-phase output in the absence of any input. Here the reactive power is compensated using 7-level based multilevel inverter with diode clamps are made utilizing the capacitors banks, diodes and switches which would therefore abates the voltage stresses and harmonics resulting in higher efficiency of the power system. Besides the functioning of multilevel inverter, STATCOM is also utilized to improve the regulation of reactive power flow and thereby, enhances the stability under transient condition of a power system. Subsequently, the compensated seven level output is procured by the sinusoidal PWM technique.","PeriodicalId":191913,"journal":{"name":"Innovations in Information and Communication Technology Series","volume":"2 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130822256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Reader for Visually Challenged Using Optical Character Recognition and Text-To-Speech","authors":"R. Sowmya, Sushma S. Jagtap, G. Kasthuri","doi":"10.46532/978-81-950008-1-4_045","DOIUrl":"https://doi.org/10.46532/978-81-950008-1-4_045","url":null,"abstract":"Assistive technology uses assistive, adaptive and rehabilitative devices for people with disabilities. It’s assessed there are about 36 million people with visual impairment in the world and a further 216 million who lead life with moderate to severe visual impairments. Leveraging technology has helped the visually challenged in carrying out tasks on par with the people blessed with vision particularly in the activities of reading and writing. In the proposed work, an image scanning device attached to a microcontroller is designed. This device is designed in the form of hand gloves for ease of usage. The glove with the camera at the fingertip, when rolled over lines of text, scans the information and converts it into digital text with Optical Character Recognition (OCR). The converted digital text is finally read aloud using Text-to-speech synthesis. The results obtained were accurate and met the standards of operability.","PeriodicalId":191913,"journal":{"name":"Innovations in Information and Communication Technology Series","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129912651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective Pulse Width Modulation Technique Analysis for CHB Multilevel Inverters","authors":"Vivekanandan S, Vignesh C J, Kamalkumar V, B. K","doi":"10.46532/978-81-950008-1-4_028","DOIUrl":"https://doi.org/10.46532/978-81-950008-1-4_028","url":null,"abstract":"This paper narrates the pulse width modulation techniques used in the multilevel inverters (MLIs). In the recent industrial revolution era, MLIs found in medium voltage high power applications especially in drives domain. The control technique employed in the MLIs decides the effective conversion of power in the circuit. The harmonic content present in the output signal will lead to the performance changes in the load side. This is indicated as measure of total harmonic distortion (THD). The output signal from MLIs is fewer harmonic when the number of levels is high without any filtering process. In addition, the control method of MLIs decides the effectiveness of the system and calculating the THD. There are different types of control methods employed in the MLIs in the various literatures. Each method differs from its benefits and suitable for driving the inverter switches for a particular application. The working of each models was discussed in detail. The models are created in MATLAB/Simulink platform and analyzed its effectiveness.","PeriodicalId":191913,"journal":{"name":"Innovations in Information and Communication Technology Series","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128449794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Terrorism Detection Using Webdata Mining","authors":"Aswathy Rh, K RoslinDayana, M VigilsonPrem","doi":"10.46532/978-81-950008-1-4_013","DOIUrl":"https://doi.org/10.46532/978-81-950008-1-4_013","url":null,"abstract":"Technology growth in facebook, whatsapp, instagram has become famous and widely used in diverse social media groups. The intention of facebook is to make the universe widely open and to stay connected. The recent mission of facebook is to stay connected with friends, colleagues, family through sharing photos, videos, stories etc. to show the daily events in the world, which provides the mean to share and express the feelings on what matters to them. Cross platform Instant messaging applications like Telegram and WhatsApp Messenger that smart phone users to establish a ubiquitous technology to exchange text, image, video and audio messages for free. This flexible technology explores more opportunities for risk and benefit for the modern era. Terrorism has increased in certain fragile parts of the world and they attack remotely. New technologies like Artificial intelligence, Machine learning autonomous and semi-autonomous systems are used by terrorist group to attack the network. These groups use social media weapons like facebook, whatsapp, Instagram to spread their information on the social network. It is essential to detect, pre-empt, prevent and eliminate the terrorism through technological spear. Terrorist groups are utilizing the internet as a platform together and convince the sin less people to take part in terrorist activities by infuriating them through web pages that inspired is enchanted individuals to take part in terrorist activities. The detection of terrorist activities needs enormous human effort. To reduce the human effort, our implement system detects the terrorist groups in social media using data mining algorithm. The intention of this work is to is to reduce the terrorism spread and to remove the terrorism related accounts effortlessly.","PeriodicalId":191913,"journal":{"name":"Innovations in Information and Communication Technology Series","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126682492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Visvesvaran, K. Siddharthraju, M. Durgashree., J. Janani, G. Indhumathi, Kaavya Js
{"title":"Renewable Energy Based System Using IoT","authors":"C. Visvesvaran, K. Siddharthraju, M. Durgashree., J. Janani, G. Indhumathi, Kaavya Js","doi":"10.46532/978-81-950008-1-4_060","DOIUrl":"https://doi.org/10.46532/978-81-950008-1-4_060","url":null,"abstract":"Bridge safety monitoring system based on IOT this is a wireless technology. In this system we can install the monitoring devices in the bridge. This monitoring device helps to connect the communication devices to a cloud-based server. we use cloud-based server here because it helps to calculates and analyses the data which sent to monitor. Bridge monitoring system can monitor, analyse bridge conditions and their environment and also detect the nearby water levels, vibration and other safety features. Through the telecommunication devices information obtained is transferred to user. In our cities many of the bridges are built on the river that can be reduced their lifetime has expired but it’s still in use.","PeriodicalId":191913,"journal":{"name":"Innovations in Information and Communication Technology Series","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115258566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}