2023 7th International Conference on Computing Methodologies and Communication (ICCMC)最新文献

筛选
英文 中文
Air Pollution Detection using Resnet-50 利用Resnet-50进行空气污染检测
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083837
Lavanya Vuyyuru, Sunny Nalluri, Jyothika Vempatapu, Ravindra babu Thopuri
{"title":"Air Pollution Detection using Resnet-50","authors":"Lavanya Vuyyuru, Sunny Nalluri, Jyothika Vempatapu, Ravindra babu Thopuri","doi":"10.1109/ICCMC56507.2023.10083837","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083837","url":null,"abstract":"Pollution has become the major concerning problem these days. Many cities are being affected by the pollution. Many people are suffering from various diseases because of the pollution around them. There is an existing system to monitor the air quality, but it consists of monitoring stations where hardware components like sensors are being used, which is more complex and expensive. Through this proposed model people can monitor the Particulate Matter 10 in their location by capturing the images of the surrounding area. In this approach particulate matter 10 is predicted by taking image as input. The images are labeled with the correct Air Quality Index (AQI) value and are extracted using regular expression. For estimating the Air Quality Index value, the convolutional neural network models ResNet-50 and mobileNet are trained. The accuracy rate of the models is determined at the end. ResNet-50 yields high accuracy rate compared to mobileNet.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123003964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Energy Harvesting Logics using MEMS for IoT Assisted Applications 一种基于MEMS的新型能量收集逻辑用于物联网辅助应用
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083545
I. S., Roselin Sneha P, N. G, S. S
{"title":"A Novel Energy Harvesting Logics using MEMS for IoT Assisted Applications","authors":"I. S., Roselin Sneha P, N. G, S. S","doi":"10.1109/ICCMC56507.2023.10083545","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083545","url":null,"abstract":"With the help of the Internet of Things (IoT), it is possible to organize and operate a vast network of internet-connected, intelligent wireless devices. The use of conventional batteries in IoT devices creates safety risks, environmental problems and shortens their lifespan. Sustainable green power utilized in wireless as well as portable devices in IoT may be achieved by the collection and transformation of ambient environmental energy. This study examines the current state-of -the-art in mechanical, light/solar, wind, sound, RF, biomechanical, and pyroelectric energy harvesting. Therefore, it is crucial for the growth of the IoT that effective methods of storing and managing energy be developed. In this study, take a look at the several energy harvesting methods that may be used with IoT devices, all of which are based on MEMS (Micro Electro Mechanical Systems). An integral aspect of the IoT is the sensor network, which in turn necessitates wireless energy delivery. The IoT has been putting into practice autonomous power harvesting technologies based on need. Vibrating devices based on MEMS are effective in collecting energy from thermal, vibrational, and electromagnetic waves, all of which are common environmental impacts. The concepts of energy collection as well as vibrating sources are explored.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116129987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Analysis of DG-TFET with Ferro Electric Material 含铁电材料DG-TFET的综合分析
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083683
Yuvraj Kadale, Prabhat Singh, Dharmendra Singh Yadav
{"title":"Comprehensive Analysis of DG-TFET with Ferro Electric Material","authors":"Yuvraj Kadale, Prabhat Singh, Dharmendra Singh Yadav","doi":"10.1109/ICCMC56507.2023.10083683","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083683","url":null,"abstract":"The most fundamental component of the electronics industries is a transistor which is a semiconductor device. Due to the limitation of SS at 60mv/decade of the MOSFET they were replaced with TFETs. A comprehensive analysis carried out on Double Gate Tunnel Field Effect Transistor (DGTFET) compared with a proposed device Ferro electric material based Double Gate Tunnel Field Effect Transistor (NC-DGTFET). This paper gives a comparative analysis between DGTFET and NC-DGTFET or Ferro Electric DGTFET. To get the optimum subthreshold swing of FETs, Ferro electric materials can efficiently be employed to boost the “ON current” and “Transconductance” of TFETs in the “overdrive zone”. Ferro electric materials are gaining popularity in the semiconductor industry due to their high permittivity and polarization properties.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115281524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Various Modulation Schemes using DDS 基于DDS的多种调制方案设计
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083652
S. Jothimani, A. Narmadha, C. Santhiya, S.SHANMUGA Priya
{"title":"Design of Various Modulation Schemes using DDS","authors":"S. Jothimani, A. Narmadha, C. Santhiya, S.SHANMUGA Priya","doi":"10.1109/ICCMC56507.2023.10083652","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083652","url":null,"abstract":"Modulation is the most crucial method and has to be designed for an FPGA board in order to avoid data loss and minimize antenna size. This work describes the creation and expansion of a digital modulation technique based on an FPGA for high- resolution communication applications. For basic and widely useddigital modulation schemes including BASK, BFSK, BPSK, and QPSK, we are focusing on the implementation of sub-sampling phase-locked loop (SS -PLL) Verilog-based code simulation. The concept of sinusoidal signals generated by a digital design synthesizer is usedin this work. The simulation is performed using the Verilog Hardware Descriptive Language on Modalism with Xilinx-ISE. The work on self-adjustable carrier frequency and bit duration serial data transmission has been finished.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116734721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Cloud Storage using a Digest Algorithm 使用摘要算法的安全云存储
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083802
Karan Sajeeth, S. Mahajan, Avanishkumar Pathak, Rishabh Saudagar, Sandeep Shiravale
{"title":"Secure Cloud Storage using a Digest Algorithm","authors":"Karan Sajeeth, S. Mahajan, Avanishkumar Pathak, Rishabh Saudagar, Sandeep Shiravale","doi":"10.1109/ICCMC56507.2023.10083802","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083802","url":null,"abstract":"In today's cyberspace, everyone stores data in a cloud, whether it be images, personal documents, or any other, and it all accesses a remote system by using the applications/technology. With the use of cloud networks in the infrastructure, the information uploaded should be maintained secure. The spread of cloud storages helps in strengthening the recent technological developments, and it is expanding the limits of the infrastructure as well. The organizations are slowly shifting their base to the cloud systems, and some service providers help in creating space in the existing storages. Cryptography is a critical tool for preventing this from happening. It protects information and communications by enforcing a set of rules, that enable only those who are supposed to receive the information, to access and handle it. It can protect crucial cloud data while without interfering with data transmission. Thus, a need to improve the current security standards and protocols used in cloud storage and make it much safer for the user, has been noticed. The goal of this research is to provide a reliable cloud service that secures data such that integrity is maintained and is safe from external threats.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123773361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of FPGA based Rescue Bot 基于FPGA的救援机器人的设计与实现
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083599
K. Sudhakar, S. S. Pirajin, J. Shanmugapriyan, S. Sujeeth
{"title":"Design and Implementation of FPGA based Rescue Bot","authors":"K. Sudhakar, S. S. Pirajin, J. Shanmugapriyan, S. Sujeeth","doi":"10.1109/ICCMC56507.2023.10083599","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083599","url":null,"abstract":"Presently, surveillance in border areas is a very difficult feat. The security staff is enforcing the law at the border in a hostile way. Already implanted video surveillance is helpful, but they would only cover a tiny area. Due to the incapacity to instantly change the camera point of view, the cameras that already are left in place are not very invaluable. Also, it is not permitted to put cameras in tropical areas since trees obstruct the cameras' angle of view. The design and implementation of a wireless robot that can recognize about internet and it can able to detect matter with the help of a passive infrared sensor are obscured in the given paper. The entire system consists of an Internet-controlled mobile robot with a mounted camera and a PIR sensor for the detection of living creatures. The user will have wireless control of the robot thanks to the ability to operate it through the internet. The PIR sensor will also provide the user with information about the detection of live beings on the computer, and the user can also view the robot's video transmission at the same time. The arm camera can move vertically along its vertical axis and diagonally around its vertical axis. The user interface on the internet allows the user to control the camera's movement, giving them a better perspective of their surroundings.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114061837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Intrusion Detection in IoT Botnets using Novel Pay-Offs and Matching Coin Game Comparing with Dominant Game Strategy 利用新型报酬和匹配投币博弈与优势博弈策略比较增强物联网僵尸网络入侵检测
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083562
T.P. Anithaashri
{"title":"Enhancing Intrusion Detection in IoT Botnets using Novel Pay-Offs and Matching Coin Game Comparing with Dominant Game Strategy","authors":"T.P. Anithaashri","doi":"10.1109/ICCMC56507.2023.10083562","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083562","url":null,"abstract":"To enhance the detection of attacks in the IoT botnets using Pay-offs and matching coin game method compared with dominant game strategy method. By using novel Pay-offs and matching coin game method, detection of attacks in the botnets performed using pytorch. The DDoS attacks disrupt the operations of IoT Botnets. The proposed system helps to detect the intrusion in the IoT botnets. It has been tested with several iterations of sample size 10. The performance of the Pay-offs and matching coin game method gives high accuracy than with dominant game strategy method. By using statistical tool SPSS mean accuracy of 92% for the Pay-offs and matching coin game method compared to the dominantly game strategy method, which gives 84% accuracy. On the whole process of prediction of accuracy in detection of intrusion in IoT botnets, the novel Pay-offs and matching coin game method gives significantly better performance compared with dominantly game strategy method.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130127791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Crypto Mining Vehicle using AI Processor with IOT Payment System 使用AI处理器和物联网支付系统的智能加密采矿车
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083520
M. Libina, V. Gnanadesigan
{"title":"Intelligent Crypto Mining Vehicle using AI Processor with IOT Payment System","authors":"M. Libina, V. Gnanadesigan","doi":"10.1109/ICCMC56507.2023.10083520","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083520","url":null,"abstract":"Globally., all companies have made large capital investments in their workstation computers; however., most of these large investments have not been used efficiently., resulting in a lower profit-to-investment ratio. To achieve a high profit-to-investment ratio., workstation computers' new time should be efficiently used by Crypto Currency Mining with the help of Artificial Intelligence., which will earn extra income to the owners. The biggest issues encountered when mining bitcoin on conventional and traditional PC systems are: 1. System Health Issues., such as heating 2. System Availability Algorithm Mining time is available. 3. Electricity usage versus cryptocurrency coin ratio With the Intelligent AI algorithm., the suggested AI (LSAI48266x) board may address the aforementioned PC mining difficulties. The proposed model includes an artificial intelligence board based on numerous characteristics that will determine crypto currency mining anytime the employee seems to be absent from the workstation computers. While it is feasible to load up decent hashes., set everything up., and leave it running for years., it is preferable to utilize an intelligent AI LSAI48266x hardware board to get the most out of your CPU while consuming the least amount of power. This study intends to benefit and reduce the consumption without compromising the performance. The cryptocurrencies that do not need the construction of a huge mining rig are the easiest to mine. Because to the growing mining difficulty and the arrival of technology specialized exclusively for bitcoin mining., it is now almost impossible to mine Bitcoin for profit at home using the processing power of a PC or laptop computer.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122408304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rapid Transit Route Access Control for Bus and Ambulance 公共汽车和救护车的快速交通路线访问控制
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10084342
S. Shilaskar, Chashu Agrawal, Pranav Dalve, Chirag Bhandari, S. Daga, S. Bhatlawande
{"title":"Rapid Transit Route Access Control for Bus and Ambulance","authors":"S. Shilaskar, Chashu Agrawal, Pranav Dalve, Chirag Bhandari, S. Daga, S. Bhatlawande","doi":"10.1109/ICCMC56507.2023.10084342","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084342","url":null,"abstract":"The city's development significantly depends on the public transportation infrastructure. It significantly affects every aspect of society, including the economy. Despite designing specific routes for them, many public transit systems nevertheless confront a significant traffic issue. These routes are used by a lot of private vehicles, which causes traffic issues. As a result, there are delays, which eventually render the BRT (Bus Rapid Transport) system inefficient. There have been multiple attempts by city cooperations in order to make boom barriers to stop the entry of unwanted vehicles in the BRT route. Yet they are ineffective, making room for critics. This research work intends to provide a bus detection and vehicle detection system that aids to identify, detect, for public transportation buses and ambulances. Image classification plays a very important role in this application as several of the feature detection and image pre-processing techniques like BRISK and SIFT, ORB and Histogram Equalization were used to improve the efficiency of the application. The proposed system shows an accuracy of 86% for detecting the bus and ambulances and accordingly operating the barrier in the BRTS corridor.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131394223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alzheimer's Disease (AD) Diagnosis from Brain MRI Image using Neural Network Algorithm 基于神经网络算法的脑MRI图像诊断阿尔茨海默病
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10084001
L. Ramesh, S. Raasika, P.S.Pooja Shree, B. Rithikashree
{"title":"Alzheimer's Disease (AD) Diagnosis from Brain MRI Image using Neural Network Algorithm","authors":"L. Ramesh, S. Raasika, P.S.Pooja Shree, B. Rithikashree","doi":"10.1109/ICCMC56507.2023.10084001","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084001","url":null,"abstract":"Disorders of the brain are one of the most difficult diseases to cure because of their fragility, the difficulty of performing procedures, and the high costs. On the other hand, the surgery itself does not have to be effective because the results are uncertain. Adults who have hypertension, one of the most common brain illnesses, may have different degrees of memory problems and forgetfulness. Depending on each patient's situation and for these reasons, it's crucial to define memory loss, determine the patient's level of decline, and determine his brain MRI scans are used to identify Alzheimer's disease. This study discusses about the utilization of deep learning in Alzheimer's disease identification. The proposed approach is utilized to enhance patient care, lower expenses, and enable quick and accurate analysis in sizable investigations. In many disciplines, including medical image processing cutting-edge deep learning approaches have recently effectively proven performance at the level of a human. By analyzing brain MRI data, a deep convolutional network model is suggested for diagnosing Alzheimer's disease. Compared to other models, the proposed model performs better for early disease detection because it can recognize distinct phases.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115159573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信