{"title":"Person Re-Identification using Deep Learning","authors":"Ananthi N, Adarsh N L, A. M, A. G.","doi":"10.1109/ICCMC56507.2023.10083656","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083656","url":null,"abstract":"Person re-identification is a task which is used to search the particular person captured in one camera vision against a set of images captured in other camera visions. When aprobeimageisgiven,theperson re-identification model has to find theclosestmatches to the probe image from gallery images and arrange the gallery images according to the similarity score. This task has challenges because of variations in lighting, pose, background clutter, scale, occlusions and similar clothing. The primary goal of this research work is to enhance the performance of the person re-identification model in terms of identification rate at RankI and mean Average Precision (mAP). To achieve this goal and overcome the limitations, the research objectives were framed to develop an unsupervised person re-identification model to overcome the problem of limited training samples and reduce computation complexity; identify an enhanced feature engineering methodology that results in reduced feature vector size and elimination of unwanted background information from the given image; design and develop a deep neural network model to effectively perform with lesser training samples and also incorporate the spatial relationship between the features; test the models and evaluate the performance using benchmark datasets. In this research work, deep learning model with ResNet50 architecture has been proposed to increase the identification rate.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116354573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Bluetooth-based Solar Panel Cleaner Robot","authors":"R. Priya, K. Radha, M. Karthikeyan","doi":"10.1109/ICCMC56507.2023.10084178","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084178","url":null,"abstract":"Fuel is one of the most pressing issues confronting the world today, and water scarcity for urban and rural people has also been a serious issue. 60-70% of the country's electricity demand is met by burning wood and crop waste. Solar power is a renewable electricity source that uses soft solar radiation and has great potential. The use of electric energy derived from petroleum is crucial for renewable energy. Solar energy has matured into a sustainable energy option, and its use must be expanded. Solar PV panels are widely employed in dusty areas of tropical nations like as India. Dust accumulates on the front of the frame, obscuring the sun's beams. It lowers the module's ability to generate electricity. Energy production is reduced by 50% if the appliance is not cleaned for a month. The cleanup tool uses the PIC programming interface to flatten the module. To improve energy efficiency by removing dust from the panel.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117264838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Renduchinthala Sai Praneeth, Kancharla Chetan Sai Akash, Bommisetty Keerthi Sree, P. Rani, Abhishek Bhola
{"title":"Scaling Object Detection to the Edge with YOLOv4, TensorFlow Lite","authors":"Renduchinthala Sai Praneeth, Kancharla Chetan Sai Akash, Bommisetty Keerthi Sree, P. Rani, Abhishek Bhola","doi":"10.1109/ICCMC56507.2023.10084319","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084319","url":null,"abstract":"Recently, on-device object detection has gained significant attention as it enables real-time visual data processing without the need for a connection to a remote server. However, deploying these models on edge devices poses several challenges such as limited computational resources, power constraints, and real-time performance. These challenges are faced in many of the existing methodologies such as Fast R-CNN, and Single Shot Detector. This experiment aims to investigate the scalability of on-device object detection using YOLOv4, CNNs, and TensorFlow Lite. Recent techniques for addressing these challenges include model compression and quantization and the use of hardware accelerators. The proposed objective of this experiment is to evaluate the performance and efficiency of these techniques in the context of on-device object detection and identify potential areas for improvement. The goal is to provide insights that can help guide the design of more efficient and effective edge-based object detection systems.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115383456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"American Sign language Recognition using Deep Learning","authors":"Anusha Puchakayala, Srivarshini Nalla, Pranathi K","doi":"10.1109/ICCMC56507.2023.10084015","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084015","url":null,"abstract":"Communication plays a vital role in day-to-day life but consider a scenario in which two people are unable to communicate with one another because one of them does not comprehend what the other person is attempting to say. Most of the deaf-mute community encounter this when conversing with ordinary folks. As sign language is used by persons with impairments, normal people don'tknow or lacks understanding of it. This communication gap must be bridged. Therefore, a model has been developed to assist normal people and enable deaf-mute individuals to communicate with one another. One such model is the sign language detection system, which uses a deep learning strategy to identify American Sign Language (ASL) gestures and output the corresponding alphabet in text format. A CNN model and YOLOv5 model were built and compared against each other. YOLO model has produced an accuracy of 84.96%, whereas CNN model has produced an accuracy of 80.59%","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modular Adder Design based on Reversible Toffoli CLA","authors":"Maheshwari A, Gukan V, J. R, K. A","doi":"10.1109/ICCMC56507.2023.10084302","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084302","url":null,"abstract":"Since reversible computing can lower heat loss and power consumption, it is a more intriguing research area today. Processor power and speed are significantly impacted by adders. Reversible Toffoli gates are used in the suggested structure in place of conventional logic for the look-ahead logic. The suggested structure is given a hybrid variable latency extend, which minimises energy usage without dramatically slowing down speed. Reversible computing necessitates an equal amount of input and output lines. Backward deterministic system is a technique recycled for nanotechnology, inadequate capacity of VLSI design, Photonic computer, and nondeterministic computing. Indicated work shows how a carry look-ahead adder with a reversible Toffoli gate can decrease trash production, gate count, and quantum efficiency in comparison to the current design.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116056767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Security Alert System for Industrial Atmospheric Parameters","authors":"Nanadakuditi Bhavana, Madhusudana rao Ranga, Atmakuri Gopala Krishna, Nandhyala Manisha, Devarapalli Rithin","doi":"10.1109/ICCMC56507.2023.10083512","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083512","url":null,"abstract":"The proposed system is a cost- and power-efficient real-time monitoring system for industrial processes. The system uses sensors to measure parameters such as temperature, gas, smoke, and fire and transmits the data to a microprocessor and mobile device using a Raspberry Pi module and GSM module. This helps to prevent accidents and improve safety in hazardous working environments. The system uses a Wireless Sensor Network (WSN) for wireless communication between devices, which is crucial for industrial applications as wiring is expensive and may cause maintenance problems. The system uploads data to the cloud using IoT and allows for remote monitoring via mobile or the internet using the Node-red. The use of WSN and IoT helps reduce human intervention while increasing efficiency and improving performance. The system is commonly used in industrial applications such as machine control, gas level monitoring, humidity measurement, and fire detection. The use of IOT in combination with firefighting has a significant impact on fire emergencies and enhances fire brigade capabilities. The proposed model is designed in a manner that at first level of saturation, alert buzzer will give a beep sound. At second level of saturation the owner will receive a message alert to a specific mobile number according to the code. At final stage of toxic saturation that is if it is more than 30 percent of the tolerance level the person will receive a phone call alert to that mobile number.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125449716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural Machine Translation using Adam Optimised Generative Adversarial Network","authors":"Ippatapu Venkata Srisurya, P. R","doi":"10.1109/ICCMC56507.2023.10084034","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084034","url":null,"abstract":"Natural Language Processing is among the emerging fields in machine learning and deep learning. Neural machine translation is a subfield of Natural Language Processing that focuses on language translation. In this paper, the different methods of Neural Machine Translation (NMT) are discussed along with their architectures. It starts from traditional NMT techniques that give poor performance when it encounters long sentences and when there are problems related to vocabulary. Attention-based NMT can provide better performance for long sentences, but the problem of vocabulary remains the same. This can get solved by Attention-based NMT along with sub-word segmentation. Moreover, some of the essential models developed in recent times are discussed. An Adam-based Bi-directional GAN is employed in this work to optimize the training process and to stabilize the GANs. The model is evaluated based on BLEU scores and is compared with the existing models.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121022590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Kumar, KALAGOTLA CHENCHIREDDY, Khammapti R Sreejyothi, Thumuluri Usha, Ankireddy Venkatasaireddy, Bandari Rakesh
{"title":"Distribution System Power Quality Improvement using IRP Theory","authors":"V. Kumar, KALAGOTLA CHENCHIREDDY, Khammapti R Sreejyothi, Thumuluri Usha, Ankireddy Venkatasaireddy, Bandari Rakesh","doi":"10.1109/ICCMC56507.2023.10084162","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084162","url":null,"abstract":"A shunt active power filter is suggested in this study. In power plants, there are different power electronic converters, which leads to power quality problems including harmonic noise and voltage swings that decrease the life of the equipment. Shunt active power filters decrease harmonics, voltage swings, and the insistence for reactive power from nonlinear loads in 1-ph (2 wire), 3-ph with neutral (4 wire), and 3-ph without neutral (3 wire). Using the pq theory, the reference compensating current is retrieved. The simulation results verified MATLAB 2015a software. Different MATLAB results are verified during the steady-state and dynamic state. The simulation results are verified output voltage, output current and THD.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125897280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Sivanandam, R. Jagadheesh, S. N. Kavi Bharath, S. Manoj
{"title":"Low Power Design of Edge Detector using Static Segmented Approximate Multipliers","authors":"K. Sivanandam, R. Jagadheesh, S. N. Kavi Bharath, S. Manoj","doi":"10.1109/ICCMC56507.2023.10083930","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083930","url":null,"abstract":"To avoid the carry resulting from the shortened component, this study suggests a truncation-based approximate multiplier with a compensation circuit created by selected k-map adjustments. Output error reduction and hardware trimming are accomplished concurrently. For error correction, 16x16 truncated multipliers based on approximate multipliers are created using streamlined NAND gate circuits. The computation process is enhanced to reduce the power, the original segmentation method for signed SSM is utilized and offer a simple, hardware-efficient corrective technique for verified multipliers. Verilog HDL is used to implement this design and Modelsim 6.4 c is used to simulate it. The synthesis process is done by Xilinx tool to measure the performance.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123722938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Gupta, K. S. Reddy, Lagadapati Vineeth, Rageeru Lenin Kumar, G. Suryanarayana
{"title":"Peer to Peer Credentials Sharing using RSA and Session Token Techniques","authors":"K. Gupta, K. S. Reddy, Lagadapati Vineeth, Rageeru Lenin Kumar, G. Suryanarayana","doi":"10.1109/ICCMC56507.2023.10083606","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083606","url":null,"abstract":"With the increase of different online platforms, the information stored also increases, and sharing the data across users sometimes cannot be done without sharing the account. This article proposes 2 strategies for securely sharing credentials with different users, considering various security aspects and maintaining user privacy. And also a comparison of the strategies for using the right one for our use and providing a sharing mechanism where users will be able to give access to a particular account to another person without actually sharing credentials or on a fixed period. Also, how the methods differ from the existing authentication mechanism used in online web applications by taking different measuring factors like Memory, Computation, and Latency. This can be achieved based on the concepts of session details saving of the authentication process in conjunction with the cryptography encryption algorithm to transmit data across the internet.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121677641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}