2023 7th International Conference on Computing Methodologies and Communication (ICCMC)最新文献

筛选
英文 中文
A Comprehensive Survey on Recent Advances in 5G Networks and Mobile Systems 5G网络和移动系统最新进展综合调查
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083901
Gaddam Pavan, V. K. R. N. Reddy, Agatamudi Ram Prasad, Radhika Rani Chintala, N. Sai
{"title":"A Comprehensive Survey on Recent Advances in 5G Networks and Mobile Systems","authors":"Gaddam Pavan, V. K. R. N. Reddy, Agatamudi Ram Prasad, Radhika Rani Chintala, N. Sai","doi":"10.1109/ICCMC56507.2023.10083901","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083901","url":null,"abstract":"The Fifth Generation (5G) of network has great advancement from other network evolutions in terms of features, flexibility, high-speed internet, quick communication, and the capacity to connect to new enterprises. However, setting up the infrastructure for the 5G network requires more cell towers and higher frequencies such as 6GHz to 100GHz and millimeter waves (MMW), which results in increased radiation emissions. This article explains the methods that have been discovered as well as some new, innovative approaches to the radiation reduction findings. This study measures the radiation based on the parameters like overall power consumption, radiation frequency and the consequences of exposure. The studies that are now available is not offering enough data to make a thorough safety evaluation of thermal impact. This study performs more investigation and study to reveal the additional aspects, including millimeter wave, mobile edge computing, a variety of antenna technology, machine learning, radioactivity, radiation types, and radiation effects. The main purpose of this research study is to highlight the recent researcher advancements in the 5G mobile system, gadgets, and radiation effects, as well as future research goals.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133254480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Blockchain Application for the Verification of Academic Information and Scalable Certification 用于学术信息验证和可扩展认证的区块链应用
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083848
Cheepurupalli Durga Pradeep, Mulagapaka Ashislh, R. Aishwarya, R. Yogitha
{"title":"A Blockchain Application for the Verification of Academic Information and Scalable Certification","authors":"Cheepurupalli Durga Pradeep, Mulagapaka Ashislh, R. Aishwarya, R. Yogitha","doi":"10.1109/ICCMC56507.2023.10083848","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083848","url":null,"abstract":"The number of colleges that now offer instruction to college students and the majority of graduates each year has steadily expanded; the requirement to only guarantee degree certificates creates new business options. This study intends to develop money model equalization, in which the graduate and agency pay the same amount for the service because they are the carrier's primary stakeholders. Students need affordable, easy-to-find confirmation of their credentials, while employers need quick, reliable level verification when hiring new employees. As many students graduate each year, the issue of phony credentials is a major problem. Companies that hire much brisker pay a lot of money to get candidates' transcripts and academic certificates established. This issue will be resolved by a certificate of the blockchain era's usage. A single individual cannot alter the data on the blockchain without the consent of all other individuals involved in preserving the records. This tightens up the knowledge.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133029270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product Negotiation in E-Commerce Website using Chatbot 基于聊天机器人的电子商务网站产品谈判
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083745
Palleti Divya Sree, Manohar Raj Kokkiligadda, Jagannadham Teja, Yelisetti Sandeep
{"title":"Product Negotiation in E-Commerce Website using Chatbot","authors":"Palleti Divya Sree, Manohar Raj Kokkiligadda, Jagannadham Teja, Yelisetti Sandeep","doi":"10.1109/ICCMC56507.2023.10083745","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083745","url":null,"abstract":"Real-world transactions always include some amount of negotiation. The only goal of negotiations is to engage in bartering. Every important business deal, including buying food from a street vendor, requires it. This suggestion will be used for an e-commerce chatbot to assist in bargaining the cost of the merchandise. Consumer feedback and occasional reviews are the two most common techniques used to track customer satisfaction. The sellers found it difficult and practically impossible to conclude any bargaining process. A chatbot system is necessary to improve client satisfaction and negotiating effectiveness. In this research work, an intelligent chatbot system was used to generate responses based on the user's purpose. Here, the main objective is to increase the effectiveness of online shopping. Therefore, to make purchasing easier, chatbots are used to communicate with sellers and negotiate prices. The chatbots will be preprogrammed with the possible questionnaire that could be possibly asked by a customer. Based on the intents that are expressed by the customer, the bot can classify them into entities. This approach includes Natural Language Processing (NLP) for the better understanding of chatbot framework.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133873608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Studies on Anomaly Detection Techniques 异常检测技术研究
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083885
Meka Hari Krishna, N. K, Garugu Charmitha, T. Vignesh, V. Ch, Swarna Kuchibhotla
{"title":"Studies on Anomaly Detection Techniques","authors":"Meka Hari Krishna, N. K, Garugu Charmitha, T. Vignesh, V. Ch, Swarna Kuchibhotla","doi":"10.1109/ICCMC56507.2023.10083885","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083885","url":null,"abstract":"Anomaly detection is well known as outlier detection, which issued to find things or objects that are deviated from the normal pattern orgeneral distribution of the dataset, anomaly detection can be detectedin credit card faults, intrusion network detection. And it helps to find the rare patterns, Decision trees are the foundation for isolation Forest (IF), which are constructed similarly to Random Forests. It is also an unsupervised model because there are no predefined labels in this instance An ensemble of binary decision trees is what isolationforests outlier detection is known as Isolation Tree, each tree in an isolation Forest (isolation Tree). The idea of Isolation Forests is that anomalies are data points that are rare a different. Isolation Forestalgorithm that isolates outliers in the data and finds anomalies this paper deals with the particular to find the dataset. One crucial use for anomaly identification is the detection of credit card fraud. Billion-dollar losses result from a sharp growth in digital frauds, thus numerous approaches for fraud detection have been developed and are being used in a variety of commercial industries The successof anomaly detection depends on choosing the right features, as irrelevant features can produce false results. In anomaly detection certain groups maybe unfairly targeted by algorithms for detecting abnormalities which leading to possible harm.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115039404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hand Gesture Controlled Car using Bluetooth Modules and Accelerometer Sensor 使用蓝牙模块和加速度计传感器的手势控制汽车
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083843
Ashish Kumar Dutta, J.Simon Gnanesh Paul, S. Siddharth, K.G. Nitish, J.S.Shyam Sundar, P.S. Manoharan
{"title":"Hand Gesture Controlled Car using Bluetooth Modules and Accelerometer Sensor","authors":"Ashish Kumar Dutta, J.Simon Gnanesh Paul, S. Siddharth, K.G. Nitish, J.S.Shyam Sundar, P.S. Manoharan","doi":"10.1109/ICCMC56507.2023.10083843","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083843","url":null,"abstract":"This research work demonstrates the usefulness of an accelerometer sensor and how it can be used to move an object using hand gestures. The device uses two Arduino UNO models, one as the transmitter and other as the receiver. The functioning of the device is based on the serial data transmitted and received through the Bluetooth modules. The data to be transmitted and received is produced by the accelerometer sensor. Based on the data received, the motors run to produce the desired movements. The device can communicate within a range of ten meters. Such a device can be used as a gesture-controlled wheelchair for handicapped people. The code for functioning is uploaded to the Arduino UNO by Arduino IDE software. The major challenge that was faced during the preparation of the model was the connection of the Bluetooth modules. Each module sends and receives data at different baud rates. If the baud rates were not same, communication will not be established. One module serially transmits the data and another module serially receives it. Different prototypes are already available with slight variations. Instead of Bluetooth modules, other modules are available to establish wireless communication. Examples are: nRF modules, RF pair, Lora WAN. As Arduino UNO is larger and consumes more space, small boards such as Arduino Nano or Arduino Lilypad has also been implemented in the available models.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122940078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SupRes: Facial Image Upscaling Using Sparse Denoising Autoencoder 使用稀疏去噪自编码器的面部图像升级
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083628
Manan Agrawal, M. Anwar, Nakul Saroha, Anurag Goel
{"title":"SupRes: Facial Image Upscaling Using Sparse Denoising Autoencoder","authors":"Manan Agrawal, M. Anwar, Nakul Saroha, Anurag Goel","doi":"10.1109/ICCMC56507.2023.10083628","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083628","url":null,"abstract":"Even in this era of digital images, still many images and media are hazy, pixelated, and blurry. This could be due to low-quality imaging sensors, poor image stabilization, or the image itself being old. This study proposes the Sparse Denoising Autoencoders (SDAEs) for upscaling blurry images. The performance of the proposed SDAEs is then compared with the deep learning architecture, Pix2Pix Generative Adversarial Networks (GANs) by primarily focusing on the facial images. The experimental results show that the SDAEs give slightly better results than GANs. Additionally, the SDAE architecture is computationally 30% efficient when compared to the Pix2Pix GAN.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125554137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electric Quad Bike with Hybrid Charging Mode for Physically Challenged 为残疾人提供混合充电模式的电动四轮摩托车
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10084320
S. Sujitha, M. S. R. Reddy, H. R, Aisiri M Urs, K. P
{"title":"Electric Quad Bike with Hybrid Charging Mode for Physically Challenged","authors":"S. Sujitha, M. S. R. Reddy, H. R, Aisiri M Urs, K. P","doi":"10.1109/ICCMC56507.2023.10084320","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084320","url":null,"abstract":"Adapted Quad bike is an attempt to make an electrically powered quad wheel bike for the physically challenged people corresponding to almost 6% of the world population, estimating approximately 200 million, facing challenges to drive vehicles. Thereby our project makes it convenient for them to travel faster, save time and reduce their dependency on other individuals in boarding public transports or travelling form one place to another and also it can used by normal peoples. It is designed with the parameters of Electric vehicle, it gives high speed, high safety, reliability and eco-friendly measures. It can be partially or fully automated depending on an individual's degree of impairment and needs.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grid-Connected Inverter Fed from PV Array 并网逆变器由光伏阵列供电
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083810
V. Kumar, Y. M. aniteja Reddy, P. Meghana, M. Prashanth, J. Srilakshmi, KALAGOTLA CHENCHIREDDY
{"title":"Grid-Connected Inverter Fed from PV Array","authors":"V. Kumar, Y. M. aniteja Reddy, P. Meghana, M. Prashanth, J. Srilakshmi, KALAGOTLA CHENCHIREDDY","doi":"10.1109/ICCMC56507.2023.10083810","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083810","url":null,"abstract":"This manuscript presents a grid-connected two-level inverter. The presented inverter is controlled by SRFtheory with a PI controller. The two-level inverter switching pulses are generated from the space vector modulation technique. The main advantages of two-level inverters are less number of switches, low switching loss, low cost and, suitable for low power rating applications. Software called MATLAB/Simulink is worn to reproduce the depicted circuit. the inverter output voltage, grid voltage, grid current, and PV module voltage are all confirmed by the simulation findings.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124884721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Adoption of Green Cloud Computing 绿色云计算应用综述
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083789
C. Sailesh, Vukkadapu Srinivasa Praneeth, Sandu Sai Koushik, Velugure Ganesh Naga Sai, Naresh Vurukonda, Vijay Kumar Burugari
{"title":"A Review on Adoption of Green Cloud Computing","authors":"C. Sailesh, Vukkadapu Srinivasa Praneeth, Sandu Sai Koushik, Velugure Ganesh Naga Sai, Naresh Vurukonda, Vijay Kumar Burugari","doi":"10.1109/ICCMC56507.2023.10083789","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083789","url":null,"abstract":"One of today's IT industry's fastest-growing subsectors is cloud computing. Through the use of their own gadgets and the internet, many people are able to use a variety of services. It offers a virtualized environment that is inexpensive, simple to use, and lower electricity usage. Considering energy use and the burden placed on computer servers, average job allocation and VM loads, this article examines the significance and utilization of green cloud computing and how it could provide alternatives to the IT sector.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125011569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Phishing Websites using Machine Learning Algorithm 利用机器学习算法检测钓鱼网站
2023 7th International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2023-02-23 DOI: 10.1109/ICCMC56507.2023.10083999
M. Kathiravan, V. Rajasekar, S. Parvez, V. Durga, M. Meenakshi, S. Gowsalya
{"title":"Detecting Phishing Websites using Machine Learning Algorithm","authors":"M. Kathiravan, V. Rajasekar, S. Parvez, V. Durga, M. Meenakshi, S. Gowsalya","doi":"10.1109/ICCMC56507.2023.10083999","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083999","url":null,"abstract":"In general, malicious websites aid the expansion of online criminal activity and stifle the growth of web service infrastructure. Therefore, there is a pressing need for a comprehensive strategy to discourage users from going to these sites online. We advocate for a method that uses machine learning to categories websites as either safe, spammy, or malicious. The proposed system is limited to examining the URL itself, rather than the contents of websites. As a result, it does away with both browser-based vulnerabilities and run-time delays. The proposed method outperforms blacklisting services in terms of generality and coverage since it makes use of learning techniques. There are three distinct categories for website addresses. Neutral Web sites provide average, risk-free functionality. For a website, “spam” refers to any attempt to overwhelm the user with advertisements or sites (such as false surveys and online dating sites). Malware is defined as a website designed by hackers to cause harm to computers and steal private data. The experimental data demonstrates a dramatic improvement in performance with the new model compared to the baseline.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130063846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信