{"title":"Performance and Security Analysis in Cloud Using Drops and T-Coloring Methods","authors":"A.Basi Reddy, R.Raj Kumar","doi":"10.1109/ICERECT56837.2022.10060014","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060014","url":null,"abstract":"Data outsourcing to a 3rd party organize, as is done with cloud computing, raises security concerns. Data outsourcing may result from attacks just on cloud by the other users and nodes. Therefore, to protect data on the cloud, strict security measures are required. The rate at which data could be retrieved must be optimized by the implemented security solution. This work suggests the splitting and replication the data in the cloud with optimal system efficiency (DROPS), which adopts a thorough strategy to the security and efficiency concerns. In accordance with the DROPS method, split a file into fragments, then replicate the information among some of the cloud server. In order to guarantee that in the event of a successful assault, the adversary would not gain any useful information, each node merely retains a single fragment of a particular data file. In order to prevent an adversary from determining out the pieces, the nodes which store them are also spaced separated by a specific amount utilizing graph T-coloring.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133400913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Triveni Gaidhane, Shraddha S. Shinde, Nilesh Aurade, U. Verma
{"title":"Smart Disease Prevention System","authors":"Triveni Gaidhane, Shraddha S. Shinde, Nilesh Aurade, U. Verma","doi":"10.1109/ICERECT56837.2022.10060650","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060650","url":null,"abstract":"Up till now many lives were lost due to various contagious s like swine flu, encephalitis, etc. Also, the whole world has faced the COVID-19 pandemic situation recently. These situations led to the thought of designing such a system that can be installed at the entry and exit gate of a mall to reduce the spread of contagious s. The proposed work is created as a prototype to not only detect the face mask and sense the body temperature but also controlling the crowd inside a mall to maintain social distancing. Additionally, the system is strengthened by a sanitization module after entering to the mall. It is a single integrated solution to all the challenges consisting of all these four modules. Apart from malls, this system can be deployed in places like shops, banks, etc. Once the person is detected at the entry gate, the count of people inside the mall is checked to maintain the social distancing norms. If found a less number of people are inside, it checks for a face mask and body temperature. When all three conditions are satisfied, it opens the door and activates the sanitization module. This system uses a Convolution Neural Network (CNN) for face detection, the MLX90614 temperature sensor for temperature sensing, and a servo motor for door control. All the modules are integrated with Raspberry-pi. The system is tested for all possible conditions and results are produced. It can be customized depending on the area of a mall or the shop and the size of the door.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133308961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of A Speech Enhancement Algorithm and Wireless Transmission","authors":"Vivek Kumar, Purnima Nag","doi":"10.1109/ICERECT56837.2022.10059876","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059876","url":null,"abstract":"The discourse signal quality is anticipated to be further improved by the discourse improvement methods without leading to any branch-off in various applications. Recent advancements in the use of cell and cell phones, hands-free systems, VoIP telephones, voice informing administration, call administration centres, and other devices necessitate effective on-going discourse upgrade and identification procedures to set them apart from conventional discourse correspondence frameworks. The conversation enhancement algorithms are anticipated to handle additional content commotion as well as convoluted twisting that occurs in any remote communication framework. In actual circumstances, the single channel (one amplifier) signal is also available. For foundation clamour concealing, the short time spectral amplitude or attenuation based technique, in particular the minimal mean square error-log spectral amplitude, is frequently used. However, it is generating an antiquated uncommon known as melodic clamour and exhibits terrible performance in low SNR (0-10dB), reverberant, and nonstationary commotion foundations.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132688374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Examination on Implementation of Deep Fake in Images Through Deep Learning","authors":"Abhilash Kumar Saxena, R. K N","doi":"10.1109/ICERECT56837.2022.10060611","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060611","url":null,"abstract":"Deep learning has been successfully used to address a variety of challenging problems, including large-scale information analysis, PC vision, and human-level control. However, deep learning engines have also been used to create software that may create risk protection, a majority rules system, and public safety. Deepfake is one of those recently developed deep learning-controlled apps. Deeply false calculations can produce phoney images and recordings that are difficult for viewers to distinguish from real ones. Deepfake is a tool used in manufactured media to produce phoney visual and auditory content based on a person's current media consumption. To make the deepfake appear plausible, fake media is used in place of a person's voice and face. Deepfakes have been used to spread misinformation as a result of this. Deepfakes are videos or pictures in which the face of one person is replaced with the face of another, usually a more famous person. With the most recent technological developments, even someone with little mechanical experience can create these recordings. This gives them the ability to mimic a prominent public figure, such as a president or VIP, increasing the potential that deepfakes will be used for other despicable ends.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"11 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132724147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. B, Rachna P, Ritika Basavaraj Hiremath, Vanshika Sai Ramadurgam, D. Shaw
{"title":"Survey on implementation of TinyML for real-time sign language recognition using smart gloves","authors":"S. B, Rachna P, Ritika Basavaraj Hiremath, Vanshika Sai Ramadurgam, D. Shaw","doi":"10.1109/ICERECT56837.2022.10060135","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060135","url":null,"abstract":"Communication is a major part of life. For people who are deaf and dumb, sign language is imperative. All sign languages contain various hand movements and finger placement which in turn form different gestures. Learning any sign language can be challenging. With the current number of different sign languages available around the world, it makes it very hard for people to use sign languages for communication without the help of a translator. Out of all the sign languages available around the world American Sign Language is used by many. Engineers and researchers around the world have been working with different machine learning algorithms to build a better system which can either be only software or along with hardware. The smart gloves have so far been the most effective hardware with machine learning software developed till now as compared to a camera. These smart gloves can be developed using TinyML with the Convolutional Neural Network (CNN) algorithm for best accuracy with low footprint. This comprehensive literature review goes into the details of the different algorithms explored for sign language recognition, the existing systems, and the proposed system using Raspberry Pi Pico.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"41 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128860585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Model of Application of SDN Data to Information Management of College Students' Archives","authors":"Xiaoxu Wei, Yiwen Song","doi":"10.1109/ICERECT56837.2022.10059987","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059987","url":null,"abstract":"College student file management system helps teachers quickly find student file information, brings great convenience for teachers to understand students, and also helps the school to master student information, so as to provide students with a more comprehensive development plan. The purpose of this paper is to study the cloud model of college student file information management based on SDN data. Using. NET Web development technology, database technology, cloud platform tools and distributed file system tools, the function design and implementation of the university student file management system are carried out. The specific research work includes the overall design of the system, database design and functional module design and key Function development and implementation, etc. This paper makes full use of the advantages of the SDN global view, designs a DDoS attack detection scheme, and decentralizes the DDoS attack detection function to the data plane. Through experiments, it not only proves that the data security detection mechanism can be implemented on the data plane and obtain performance advantages, more importantly, it is fully utilized. The advantage of the SDN mechanism is to perform DDoS attack detection on the data plane and reduce the overhead of the controller.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131299709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android Integrated Voice based walking stick for blind with obstacle recognition","authors":"Aryan Bhatnagar, Aishani Ghosh, S. M. Florence","doi":"10.1109/ICERECT56837.2022.10060809","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060809","url":null,"abstract":"Blind Stick is a game-changing navigational aid for the visually impaired members of the society. This is a product that will help the very needful blind members of the society and make this in the hope of making their life a little easier and make them feel a little more empowered. It is designed to communicate with users through a voice-based guide which will detect obstacles, recognise them, detect moisture(water bodies and puddles) and voice assist the blind along with an SOS(Distress signal) feature in order to facilitate mobility and ensure their safety. It is difficult for blind members of society to detect the obstacle and understand the type of the obstacle. The blind stick will detect and recognise the obstacle (eg: Staircase) and will warn the person using the blindstick using android integrated voice based intimation and image recognition. This blind Stick makes it easier for blind people to navigate and communicate with family members in need through SOS navigation. This makes it possible for them to move without any help or guidance.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133848287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Investigation on Sentiment Analysis merged with CNN and Deep BI-GRU Model","authors":"Gulista Khan, Devi Kanniga","doi":"10.1109/ICERECT56837.2022.10060169","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060169","url":null,"abstract":"Convolutional neural networks (CNN) and recurrent neural networks (RNN) have been utilised in message sentiment analysis, and both have produced promising results. CNN overlooks the coherent semantic information between words despite its ability to separate nearby information between successive articulations of a sentence. Many of the current sentiment analysis methods are seeking to extract the complicated semantic also, linguistic data from the message, however they are not especially applicable to the examination of understudy opinions. For the study of student message sentiment, the CNN-BiGRU-AT model—often referred to as a novel convolutional neural network with the bidirectional gated recurrent unit and an attention mechanism—is developed. The removal of n-gram information from each sentence is subsequently accomplished using a convolutional neural network (CNN). The sentences are then consecutively condensed through the bidirectional gated intermittent unit to dispose of the message's significant semantic data parts (BiGRU). The CNN-BiGRU model is then given a thinking mechanism, and by including the attention score, different learning loads are introduced to the model. The disclosures display that its structure's accuracy rate and audit rate dependably outperform 0.9, and the F1 regard isn't lower than 0.8. These figures are superior to those of various models.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124557771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Mental Balance of Workforce in the Corporate","authors":"Rashi Mittal, Shikha Agarwal","doi":"10.1109/ICERECT56837.2022.10059703","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059703","url":null,"abstract":"Albeit the meaning of work-life balance (WLB) is connected to word related mental results in numerous countries and ventures, the UK development industry, a huge piece of the UK economy, has not been read up for these associations. High paces of mental health issues and low assistance looking for are issues in this workforce. Accordingly, this study's targets were to examine the associations between WLB, mental health, perspectives toward mental health issues, and work plans. One hundred 44 UK development workers finished the tests for every one of those three developments. WLB was viewed as adversely corresponded with mental health issues and attitudes. With a little impact size, mental health perspectives didn't intercede the relationship among WLB and mental health issues. The best sign of mental health issues was WLB. Work design bunches showed various degrees of mental health issues; daytime workers had more awful mental health than blended workers. The outcomes will support extending comprehension of WLB and the improvement of additional compelling solutions for poor WLB and mental health among UK development workers, bosses, and authoritative analysts.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122015794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Divikshi Saran, A. Anand, K. Gupta, Asan Sukriya, R. K. Jatoth
{"title":"Analysis of Isolated DC-DC Converters for Medium Power Applications","authors":"Divikshi Saran, A. Anand, K. Gupta, Asan Sukriya, R. K. Jatoth","doi":"10.1109/ICERECT56837.2022.10059906","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059906","url":null,"abstract":"DC-DC converters are widely used as power supplies in many applications of spacecraft subsystems such as dc motor drives, electronics packages, relay coil supplies etc. These dc-dc converters are required to step down or step up the raw bus voltage to the required output voltage. Based on the user requirement, a DC-DC converter is designed with a single or multiple output. For multiple outputs an isolated converter topology is must whereas for single output there is an option of using isolated topologies like Forward, Push-Pull, Flyback, Half bridge, Interleaved forward/ flyback, Full bridge etc. or simple non-isolated dc-dc converter topologies like buck or boost converter. Apart from considering complexity/ component count/ cost to finalize the topology, the requirement of ground isolation between power source and load end is very critical for some users to avoid ground noise induced problems, which may prompt the use of isolated topologies. In this paper, a detailed study & analysis, based on hardware results has been carried out for designing a single isolated output DC-DC converter for the output power requirement of 140W (28V/5A) operating at variable input voltage of 26V to 42V. Based on the literature survey, three isolated topologies, Half Bridge Converter, Push-Pull Converter and Interleaved Forward Converter have been shortlisted for hardware implementation & analysis. The advantages & disadvantages of all three topologies have been summarized and a comparison has been made based on hardware results. Parameters like efficiency, peak input current, maximum voltage stress on switch, switch power dissipation (both switching and conduction losses) and other important waveforms are analyzed in this paper for better understanding. Based on the comparison of three topologies, a conclusion has been made to decide the optimum topology for 28V/5A, 140W output power requirement for the input range of 26V–42V.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122134126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}