{"title":"Design & development of transmitted & encrypted datas using SDN and energy self-healing concepts used in RF energy harvesting wireless sensor nets","authors":"S. S, T. Manjunath","doi":"10.1109/ICICICT54557.2022.9917923","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917923","url":null,"abstract":"Self Healing Network (SHN) is reconfigurable, which means that the topology of the network can be changed by the nodes in the network like a mobile ad-hoc network. Software Defined Network (SDN) has gained more popularity as a network architecture platform for SHN in recent years. SDN performs an efficient centralized network management. SDN architecture can adapt quickly to new network changes and also makes an intelligent network configuration. In this paper, an efficient algorithm for SHN is proposed to allocate energies to the sensor nodes and to heal the energies of the sensor nodes after every data transmission with very less time. Also, an effective AES encryption algorithm is used for secured data transmission. Simulation results obtained by using Netbeans IDE shows time taken for energy self-healing and AES encrypted data for the original data transmitted.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115686311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Entropy based Detection approach for Micro-UAV and Classification using Machine Learning","authors":"Srihasam Mahesh Kaushik, Vuddagiri Chaitanya, Parasuramuni Kiran Kumar, Mohd Musaddiq Ahmed, Swetha Namburu","doi":"10.1109/ICICICT54557.2022.9917577","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917577","url":null,"abstract":"In this paper, we explore the techniques for detection and classification of Unmanned Aerial Vehicles (UAVs) using statistical features of the remote controller Radio Frequency (RF) signals in the presence of environmental noise. In the detection mechanism, the RF signal is transformed into Wavelet domain to filter out noise as well as to reduce computational cost. A kernel entropy based approach is used to partition the RF signal into bins and detect the presence of UAV. Unlike Conventional approaches, we compute the energy transient of signal from the Short Time Fourier Transform (STFT) coefficients obtained from Spectrogram of RF signal. Further, the higher order statistical features of energy transient signal are derived and ranked using Neighborhood Component Analysis (NCA)to select notable features for reducing the computational overhead. Finally, the significant features are used to train machine learning algorithm for classification. The algorithms are trained and tested using MPACT DroneRC Dataset containing 50 RF signals from each of the 15 different micro-UAV controllers. The dataset is partitioned with train to test ratio of 4:1 i.e., 80% of dataset is used for training and 20% for testing the algorithm. The k- Nearest Neighbor (kNN) algorithm with NCA classifies all micro-UAVs with an accuracy of 96.66%. The detection technique is also simulated for different Signal to Noise Ratio (SNR) levels and outcomes are reported.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116972151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Models based Mental Health Detection","authors":"Manivannan Karunakaran, Jeevanantham Balusamy, Krishnakumar Selvaraj","doi":"10.1109/ICICICT54557.2022.9917622","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917622","url":null,"abstract":"This century will be the fastest ever, putting a heavy burden on future generations, especially students. Future generations will face enormous stress, competition, social issues, and constant pressure. Their lives will become a race. That leaves students with mental health issues that lead to disorders. Five of the most common types of disorders that young people especially face are bipolar disorder (mood disorders), anxiety disorders, depression, eating disorders, and sleep issues. As machine learning plays a vital role in the easiness of human life, this paper also uses Machine Learning (ML) algorithms to screen Mental Health by using a Mental Disorder Questionnaire (MDQ). In this research, there are two types of Questionnaires employed. The first Self Reporting Questionnaire-15 (SRQ-15) has 15 general mental disorder questions with the option of Yes/No. The second Self Reporting Questionnaire-25 (SRQ-25) has 25 questions, five questions for each of the five different mental health disorders mentioned. Within each section, the user fills the questionnaire according to the instructions. We labeled the train data set using Supervised Machine Learning. So we use different algorithms to compare results with manual testing.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115522327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. D, Annammal Arputhamary I, Revathi R, Girija Bai H
{"title":"A Characterization for Ladder like Chemical Structures","authors":"A. D, Annammal Arputhamary I, Revathi R, Girija Bai H","doi":"10.1109/ICICICT54557.2022.9917942","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917942","url":null,"abstract":"Molecules are generally symbolized as undirected graphs indicate atoms as nodes and the edges depict covalent bonds between them. The notion of 1-factors is analogous to Kekule structures in chemical graphs. In this article, a new technique based on the covering numbers in graph theory to substantiate the existence of Kekule structures in chemical graphs is proposed. Initially, we study Kekulean graphs which are ladder like, such as crossed prisms, pencil, cubical and cycle of ladder graphs. Using these results, we show that characterizing chemical structures with same vertex and edge covering numbers is beneficial to identify more stable compounds. It is also shown that topped ladders are Kekulean if any one of its node is removed. Furthermore, a necessary and sufficient condition is obtained for graphs in which removal of a node results in a Kekulean graph.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124483174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ameya K. Saonerkar, A. Kadu, Nivedita Padole, O. Mohamed, Walid N. Alnabulsi, Purva P. Khot, B. Bagde, P. Fulzele
{"title":"Effects of Electric Vehicles Charging on the distribution system","authors":"Ameya K. Saonerkar, A. Kadu, Nivedita Padole, O. Mohamed, Walid N. Alnabulsi, Purva P. Khot, B. Bagde, P. Fulzele","doi":"10.1109/ICICICT54557.2022.9917958","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917958","url":null,"abstract":"This paper presents effects of charging electric vehicles (EV) on distribution system. Precisely, effects on bus voltage profile and power losses, due to charging on radial distribution system (RDS) to ring main distribution system (RMDS) and advance RMDS networks with the assistance of Distributed Generation (DG) as well as capacitor banks. Framework assimilate DG which replicates current inceptions due to solar photo voltaic (PV), wind, biogas and other upcoming renewable power sources along with traditional power factor correction measures like capacitor banks in the first place, so that system is pragmatic in design to replicate the real distribution system. The work will be conducted on steady state system and implemented on IEEE 33-Bus test system using the MATLAB programming environment on manifold case studies.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122943870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. M, T. Poojalakshmi, A. Riyavarshini, S. Begum, G. S. V. Vijayalakshmi, N. Vigneshwari, M. Moorthi
{"title":"Computational Fluid Analysis of Stented Cerebral Aneurysm in Smokers","authors":"S. M, T. Poojalakshmi, A. Riyavarshini, S. Begum, G. S. V. Vijayalakshmi, N. Vigneshwari, M. Moorthi","doi":"10.1109/ICICICT54557.2022.9917803","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917803","url":null,"abstract":"Recent studies say that 6.5 million people have unruptured cerebral aneurysms. Modern treatment for unruptured cerebral aneurysms uses newly devised flow diverters like pCONus, pulse rider, eCLIPs, etc.. Among these, eCLIPs has been the subject for many studies and has been proved to be more effective than others. CFD analysis is used to investigate blood flow post the placement of flow diverters. There is no detailed CFD study for smokers with aneurysms post endovascular treatment with flow diverters. In our study, we considered both smokers and non-smokers and analysed blood flow post-treatment with eCLIP using CFD. The properties of blood vessels and blood flow vary for smokers due to the presence of chemicals like nicotine. Here the blood vessel with eCLIP is modelled and visualised using Blender software. The blood vessel with and without aneurysm is modelled for various conditions using COMSOL software for CFD analysis. The velocity and pressure variation are analysed for different areas in the blood vessel.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123303477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoMT Enabled Prototype Edge Computing Healthcare System for Isolated Patients","authors":"Shamna P.A, Priyanka C Mohan","doi":"10.1109/ICICICT54557.2022.9917973","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917973","url":null,"abstract":"Continuous patient care and the use of multiple medical machines are two challenges facing today's healthcare sector in terms of patient’s healthcare. During the pandemic situation, many people isolated in their home, such as covid-19 positive patients, elderly people living away from their families, bedridden patients, etc., need regular health checks and controls, but during this pandemic is lacking. Recent advances in the Internet of Medical Things (IoMT) has been able to give good results in collecting health data of patients at home environment. Deep learning (DL) applications can able to run on edge nodes, it locally processes, computes and analyzes data from IOMT devices to make inferences on patient health information. This ensures the privacy and security of the patient's physiological information and also and allows patient health information to remain at the patient's side. Send all this information to healthcare professionals and relatives of patients. This framework will provide safety for isolated patients and a health support systemas a whole.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121678935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encryption with Automatic key Generation and Compression","authors":"M. G.C, V. Perumal","doi":"10.1109/ICICICT54557.2022.9917718","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917718","url":null,"abstract":"Many applications rely on the transmission of digital images which contains confidential information. It is necessary to secure the confidential images from the eve’s droppers. Along with the attempts of providing confidentiality, it is also essential to reduce the amount of time taken for the encryption with the help of data compression techniques. To enhance the security, key should be changed frequently to repel the brute force attacks. The aim of this research is twofold. First, to propose a simple automatic key generation technique by using the modified logistic chaotic map and Chinese remainder theorem (CRT). Second, to improve the speed of encryption by using Integer wavelet-based compression. The qualitative analysis of the key generation is evaluated with the help of average hamming distance. The encryption quality is assessed with the help of statistical and sensitivity tests. Performance of the system is reported in terms of throughput.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122042050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Synchronous NoC for High Speed Multiprocessor Environment","authors":"A. K, Mohammed Sadiq, Srivani Dommati","doi":"10.1109/ICICICT54557.2022.9917721","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917721","url":null,"abstract":"As technology advances, processors are scale down size by reducing channel length. However, number of issues raises by scaling down of channel length. Network on Chip (NoC) is the supported communication protocol for System on Chip (SoC) and provides parallel communication among processing elements (PEs). Designing of synchronous NoC is quite complex as different parameters such as unbalanced traffic, buffer utilization affect the performance. This paper proposes an intra-inter buffer structure to support unbalance traffic. The proposed NoC router is able to configure channel dynamically depends on traffic conditions hence avoiding of Head of Line (HoL) error for data packet. The proposed NoC router is achieved approximately 45% more operating frequency when compared to traditional router.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123941251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COVID-19 Detection from Chest X-Rays Using Deep Learning Techniques","authors":"T. A. Suresh, Viji Rajendran V","doi":"10.1109/ICICICT54557.2022.9917612","DOIUrl":"https://doi.org/10.1109/ICICICT54557.2022.9917612","url":null,"abstract":"The CoronaVirus Disease (COVID-19) is a global pandemic, according to theWorld Health Organization (WHO), which was declared in March 2020. Medical image analysis is a well-known method that could be useful in detecting COVID-19. This is because the cardiovascular system is the organ in the body that is most affected by the virus, so the chest X-rays may be a more suitable technique than thermal screening. Deep learning (DL) algorithms can play a crucial role in diagnosing COVID-19 patients’ Chest X-Ray (CXR) pictures when properly studying them. The first stage involved in covid detection is pre-processing where cropping and resizing of image for fast processing. The next stage is feature extraction and classification by using deep convolution network. Various methods involved in these stages are studied and model was build using Pre-trained models.","PeriodicalId":246214,"journal":{"name":"2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126454411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}