Gaddam Pavan, V. K. R. N. Reddy, Agatamudi Ram Prasad, Radhika Rani Chintala, N. Sai
{"title":"A Comprehensive Survey on Recent Advances in 5G Networks and Mobile Systems","authors":"Gaddam Pavan, V. K. R. N. Reddy, Agatamudi Ram Prasad, Radhika Rani Chintala, N. Sai","doi":"10.1109/ICCMC56507.2023.10083901","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083901","url":null,"abstract":"The Fifth Generation (5G) of network has great advancement from other network evolutions in terms of features, flexibility, high-speed internet, quick communication, and the capacity to connect to new enterprises. However, setting up the infrastructure for the 5G network requires more cell towers and higher frequencies such as 6GHz to 100GHz and millimeter waves (MMW), which results in increased radiation emissions. This article explains the methods that have been discovered as well as some new, innovative approaches to the radiation reduction findings. This study measures the radiation based on the parameters like overall power consumption, radiation frequency and the consequences of exposure. The studies that are now available is not offering enough data to make a thorough safety evaluation of thermal impact. This study performs more investigation and study to reveal the additional aspects, including millimeter wave, mobile edge computing, a variety of antenna technology, machine learning, radioactivity, radiation types, and radiation effects. The main purpose of this research study is to highlight the recent researcher advancements in the 5G mobile system, gadgets, and radiation effects, as well as future research goals.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133254480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cheepurupalli Durga Pradeep, Mulagapaka Ashislh, R. Aishwarya, R. Yogitha
{"title":"A Blockchain Application for the Verification of Academic Information and Scalable Certification","authors":"Cheepurupalli Durga Pradeep, Mulagapaka Ashislh, R. Aishwarya, R. Yogitha","doi":"10.1109/ICCMC56507.2023.10083848","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083848","url":null,"abstract":"The number of colleges that now offer instruction to college students and the majority of graduates each year has steadily expanded; the requirement to only guarantee degree certificates creates new business options. This study intends to develop money model equalization, in which the graduate and agency pay the same amount for the service because they are the carrier's primary stakeholders. Students need affordable, easy-to-find confirmation of their credentials, while employers need quick, reliable level verification when hiring new employees. As many students graduate each year, the issue of phony credentials is a major problem. Companies that hire much brisker pay a lot of money to get candidates' transcripts and academic certificates established. This issue will be resolved by a certificate of the blockchain era's usage. A single individual cannot alter the data on the blockchain without the consent of all other individuals involved in preserving the records. This tightens up the knowledge.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133029270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Product Negotiation in E-Commerce Website using Chatbot","authors":"Palleti Divya Sree, Manohar Raj Kokkiligadda, Jagannadham Teja, Yelisetti Sandeep","doi":"10.1109/ICCMC56507.2023.10083745","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083745","url":null,"abstract":"Real-world transactions always include some amount of negotiation. The only goal of negotiations is to engage in bartering. Every important business deal, including buying food from a street vendor, requires it. This suggestion will be used for an e-commerce chatbot to assist in bargaining the cost of the merchandise. Consumer feedback and occasional reviews are the two most common techniques used to track customer satisfaction. The sellers found it difficult and practically impossible to conclude any bargaining process. A chatbot system is necessary to improve client satisfaction and negotiating effectiveness. In this research work, an intelligent chatbot system was used to generate responses based on the user's purpose. Here, the main objective is to increase the effectiveness of online shopping. Therefore, to make purchasing easier, chatbots are used to communicate with sellers and negotiate prices. The chatbots will be preprogrammed with the possible questionnaire that could be possibly asked by a customer. Based on the intents that are expressed by the customer, the bot can classify them into entities. This approach includes Natural Language Processing (NLP) for the better understanding of chatbot framework.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133873608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meka Hari Krishna, N. K, Garugu Charmitha, T. Vignesh, V. Ch, Swarna Kuchibhotla
{"title":"Studies on Anomaly Detection Techniques","authors":"Meka Hari Krishna, N. K, Garugu Charmitha, T. Vignesh, V. Ch, Swarna Kuchibhotla","doi":"10.1109/ICCMC56507.2023.10083885","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083885","url":null,"abstract":"Anomaly detection is well known as outlier detection, which issued to find things or objects that are deviated from the normal pattern orgeneral distribution of the dataset, anomaly detection can be detectedin credit card faults, intrusion network detection. And it helps to find the rare patterns, Decision trees are the foundation for isolation Forest (IF), which are constructed similarly to Random Forests. It is also an unsupervised model because there are no predefined labels in this instance An ensemble of binary decision trees is what isolationforests outlier detection is known as Isolation Tree, each tree in an isolation Forest (isolation Tree). The idea of Isolation Forests is that anomalies are data points that are rare a different. Isolation Forestalgorithm that isolates outliers in the data and finds anomalies this paper deals with the particular to find the dataset. One crucial use for anomaly identification is the detection of credit card fraud. Billion-dollar losses result from a sharp growth in digital frauds, thus numerous approaches for fraud detection have been developed and are being used in a variety of commercial industries The successof anomaly detection depends on choosing the right features, as irrelevant features can produce false results. In anomaly detection certain groups maybe unfairly targeted by algorithms for detecting abnormalities which leading to possible harm.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115039404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hand Gesture Controlled Car using Bluetooth Modules and Accelerometer Sensor","authors":"Ashish Kumar Dutta, J.Simon Gnanesh Paul, S. Siddharth, K.G. Nitish, J.S.Shyam Sundar, P.S. Manoharan","doi":"10.1109/ICCMC56507.2023.10083843","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083843","url":null,"abstract":"This research work demonstrates the usefulness of an accelerometer sensor and how it can be used to move an object using hand gestures. The device uses two Arduino UNO models, one as the transmitter and other as the receiver. The functioning of the device is based on the serial data transmitted and received through the Bluetooth modules. The data to be transmitted and received is produced by the accelerometer sensor. Based on the data received, the motors run to produce the desired movements. The device can communicate within a range of ten meters. Such a device can be used as a gesture-controlled wheelchair for handicapped people. The code for functioning is uploaded to the Arduino UNO by Arduino IDE software. The major challenge that was faced during the preparation of the model was the connection of the Bluetooth modules. Each module sends and receives data at different baud rates. If the baud rates were not same, communication will not be established. One module serially transmits the data and another module serially receives it. Different prototypes are already available with slight variations. Instead of Bluetooth modules, other modules are available to establish wireless communication. Examples are: nRF modules, RF pair, Lora WAN. As Arduino UNO is larger and consumes more space, small boards such as Arduino Nano or Arduino Lilypad has also been implemented in the available models.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122940078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manan Agrawal, M. Anwar, Nakul Saroha, Anurag Goel
{"title":"SupRes: Facial Image Upscaling Using Sparse Denoising Autoencoder","authors":"Manan Agrawal, M. Anwar, Nakul Saroha, Anurag Goel","doi":"10.1109/ICCMC56507.2023.10083628","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083628","url":null,"abstract":"Even in this era of digital images, still many images and media are hazy, pixelated, and blurry. This could be due to low-quality imaging sensors, poor image stabilization, or the image itself being old. This study proposes the Sparse Denoising Autoencoders (SDAEs) for upscaling blurry images. The performance of the proposed SDAEs is then compared with the deep learning architecture, Pix2Pix Generative Adversarial Networks (GANs) by primarily focusing on the facial images. The experimental results show that the SDAEs give slightly better results than GANs. Additionally, the SDAE architecture is computationally 30% efficient when compared to the Pix2Pix GAN.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125554137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sujitha, M. S. R. Reddy, H. R, Aisiri M Urs, K. P
{"title":"Electric Quad Bike with Hybrid Charging Mode for Physically Challenged","authors":"S. Sujitha, M. S. R. Reddy, H. R, Aisiri M Urs, K. P","doi":"10.1109/ICCMC56507.2023.10084320","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10084320","url":null,"abstract":"Adapted Quad bike is an attempt to make an electrically powered quad wheel bike for the physically challenged people corresponding to almost 6% of the world population, estimating approximately 200 million, facing challenges to drive vehicles. Thereby our project makes it convenient for them to travel faster, save time and reduce their dependency on other individuals in boarding public transports or travelling form one place to another and also it can used by normal peoples. It is designed with the parameters of Electric vehicle, it gives high speed, high safety, reliability and eco-friendly measures. It can be partially or fully automated depending on an individual's degree of impairment and needs.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129221440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Kumar, Y. M. aniteja Reddy, P. Meghana, M. Prashanth, J. Srilakshmi, KALAGOTLA CHENCHIREDDY
{"title":"Grid-Connected Inverter Fed from PV Array","authors":"V. Kumar, Y. M. aniteja Reddy, P. Meghana, M. Prashanth, J. Srilakshmi, KALAGOTLA CHENCHIREDDY","doi":"10.1109/ICCMC56507.2023.10083810","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083810","url":null,"abstract":"This manuscript presents a grid-connected two-level inverter. The presented inverter is controlled by SRFtheory with a PI controller. The two-level inverter switching pulses are generated from the space vector modulation technique. The main advantages of two-level inverters are less number of switches, low switching loss, low cost and, suitable for low power rating applications. Software called MATLAB/Simulink is worn to reproduce the depicted circuit. the inverter output voltage, grid voltage, grid current, and PV module voltage are all confirmed by the simulation findings.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124884721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Sailesh, Vukkadapu Srinivasa Praneeth, Sandu Sai Koushik, Velugure Ganesh Naga Sai, Naresh Vurukonda, Vijay Kumar Burugari
{"title":"A Review on Adoption of Green Cloud Computing","authors":"C. Sailesh, Vukkadapu Srinivasa Praneeth, Sandu Sai Koushik, Velugure Ganesh Naga Sai, Naresh Vurukonda, Vijay Kumar Burugari","doi":"10.1109/ICCMC56507.2023.10083789","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083789","url":null,"abstract":"One of today's IT industry's fastest-growing subsectors is cloud computing. Through the use of their own gadgets and the internet, many people are able to use a variety of services. It offers a virtualized environment that is inexpensive, simple to use, and lower electricity usage. Considering energy use and the burden placed on computer servers, average job allocation and VM loads, this article examines the significance and utilization of green cloud computing and how it could provide alternatives to the IT sector.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125011569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kathiravan, V. Rajasekar, S. Parvez, V. Durga, M. Meenakshi, S. Gowsalya
{"title":"Detecting Phishing Websites using Machine Learning Algorithm","authors":"M. Kathiravan, V. Rajasekar, S. Parvez, V. Durga, M. Meenakshi, S. Gowsalya","doi":"10.1109/ICCMC56507.2023.10083999","DOIUrl":"https://doi.org/10.1109/ICCMC56507.2023.10083999","url":null,"abstract":"In general, malicious websites aid the expansion of online criminal activity and stifle the growth of web service infrastructure. Therefore, there is a pressing need for a comprehensive strategy to discourage users from going to these sites online. We advocate for a method that uses machine learning to categories websites as either safe, spammy, or malicious. The proposed system is limited to examining the URL itself, rather than the contents of websites. As a result, it does away with both browser-based vulnerabilities and run-time delays. The proposed method outperforms blacklisting services in terms of generality and coverage since it makes use of learning techniques. There are three distinct categories for website addresses. Neutral Web sites provide average, risk-free functionality. For a website, “spam” refers to any attempt to overwhelm the user with advertisements or sites (such as false surveys and online dating sites). Malware is defined as a website designed by hackers to cause harm to computers and steal private data. The experimental data demonstrates a dramatic improvement in performance with the new model compared to the baseline.","PeriodicalId":197059,"journal":{"name":"2023 7th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130063846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}