Vijaya Vardan Reddy S, B. Jaison, A. Balaji, D. Indumathy, S. Vanaja, J. J. Jeya Sheela
{"title":"Agri-IoT: A Farm Monitoring and Automation System using Internet of Things","authors":"Vijaya Vardan Reddy S, B. Jaison, A. Balaji, D. Indumathy, S. Vanaja, J. J. Jeya Sheela","doi":"10.1109/ICEARS56392.2023.10085235","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085235","url":null,"abstract":"In order to improve efficiency and maximize crop yield in developing countries like India, there is a need to modernize and upgrade agricultural tools and techniques. One solution is the implementation of an automated, intelligent Agri -IoT system that utilizes solar power and monitors water usage based on soil moisture, temperature, and humidity levels. This system aims to optimize the use of natural resources such as water and solar energy, while also preventing the overuse of resources like electricity and water. The system can be controlled both automatically and via Bluetooth, and is designed to stop every 10 seconds in the field to allow for sensor readings. The robot module is powered by a battery that is recharged by a solar panel when not in use. The sensor module is the central point for the Agri-IoT system, collecting and updating data in the cloud. If parameters in the field fall below a certain threshold, the pump operation module will activate to maintain optimal conditions.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128948983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Balachander, Nazia Akhlaq, Rohit Bansal, S. A. Vasani, Kamlesh Singh, Raja Mannar Badur
{"title":"Financial Crisis Prediction using Feature Subset Selection with Quantum Deep Neural Network","authors":"T. Balachander, Nazia Akhlaq, Rohit Bansal, S. A. Vasani, Kamlesh Singh, Raja Mannar Badur","doi":"10.1109/ICEARS56392.2023.10085208","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085208","url":null,"abstract":"In the process, financial decisions are mostly dependent upon the classification system that is employed for allocating a group of observations into stable groups. A different group of data classification systems can be projected to forecast the financial crisis of institutions utilizing the previous data. An important procedure concern the design of precise financial crisis prediction (FCP) method containing the best of proper variables (features) which are connected to the problems at hand. It is called a feature selection (FS) problem which helps for improvising the classification outcomes. Also, computational intelligence systems are utilized as classifier methods for determining the financial crisis of organizations. Therefore, this study develops an automated FCP using FS with quantum deep neural network (FCPFS-QDNN) technique. The FCPFS-QDNN technique intends to predict the financial crisis via the choice of FS and ML models. Initially, the FCPFS -QDNN technique normalizes the input financial data into a scalar format. For FS process, the FCPFS-QDNN technique uses interactive search algorithm based FS (ISA-FS) technique to choose feature subsets. Finally, QDNN model is applied to the predictive process in the financial sector. The experimental output exhibit that the inclusion of FS and ML has promising influence on enhancing the predictive results of the FCPFS-QDNN technique in terms of different measures.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116311573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Sathish, A. Mahesh, N. Karpagam, R. Vasugi, J. Indumathi, T. Kanchana
{"title":"Intelligent Email Automation Analysis Driving through Natural Language Processing (NLP)","authors":"C. Sathish, A. Mahesh, N. Karpagam, R. Vasugi, J. Indumathi, T. Kanchana","doi":"10.1109/ICEARS56392.2023.10085351","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085351","url":null,"abstract":"Electronic Mail (E-mail) is a technique for interchange messages between individuals utilizing electronic gadgets. Electronic Mail in the current scenario turned out to be a universal communication medium, and to the point of view it prevails that, an email address has much of the importance and treated as a vital. It is essential for any speedy communications in the business, government, trading, diversion, and different circles of day-to-day requisites. In addition to the mail a spam message is an instant message for promoting a specific item or administration is a very uncomfortable to the users. Most email spam messages are business in nature. Regardless of whether business, many are irritating, yet in addition risky in light of the fact that they might contain joins that lead to phishing sites or destinations that are facilitating malware - or incorporate malware as document connections. These spam messages from unknown person is often happening. These messages can either be avoided or considered after translating it using this message analysis method. Message Analysis separates the messages into spam messages and non-spam messages. In this process, by analyzing the senders' ID or number, non-spam messages are categorized based on languages and language detection. After categorization, the categorized messages can either managed by translating the messages or ignored. A reply can be sent to the received messages on ones preferred language, while typing the message, the content will be analyzed based on certain properties like grammatical errors, sentiment analysis, spelling correction and so on. The reply message will then be translated to the received message language and delivered. These problems are intended to be addressed by using the Natural Language Processing (NLP) techniques.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116356342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Bandwidth & Gain using Trapezoidal Microstrip Feed with X-Shape DRA","authors":"B. Pujitha, Shaik Nausheen, Haneesha Perusomula, Surapaka Alekhya, Ch. Swapna, Akaramsetty Narendra Kumar","doi":"10.1109/ICEARS56392.2023.10085517","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085517","url":null,"abstract":"As microwave technology develops, the dielectric resonator antenna (DRA) is being employed more and more in point-to-point communications systems. Their research supported the notion that dielectric resonator antennas are desirable alternatives to conventional low-advantage antenna factors, together with microstrip patches, monopoles, and dipoles. This article uses an X-shaped DRA to excite a microstrip line with a trapezoidal form. This arrangement increases impedance bandwidth by 78%. The highest advantage of those antennas, which cover the c-band (48GHz) of the electromagnetic spectrum, is 6.8dB. Wi-Fi routers, telecom, aerial navigation structures, marine radio navigation structures, and other weather radar systems are some of the applications for this antenna.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116677730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Josphineleela, D. Lekha, L. Natrayan, K. Purohit
{"title":"Biometric Aided Intelligent Security System Built using Internet of Things","authors":"R. Josphineleela, D. Lekha, L. Natrayan, K. Purohit","doi":"10.1109/ICEARS56392.2023.10085572","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085572","url":null,"abstract":"Protection is critical for information, property, and even living beings. The usage of IoT and biometrics for security is becoming increasingly common as technology progresses. Facial recognition is widely accepted as a universally applicable, aggregated, and easily accessible biometric technology. Facial biometrics employ the same indicators that humans use to differentiate between persons. This study has investigated the face recognition technology in order to create a dependable door lock system. The biometric face recognition system developed using ESP32-CAM. When a face comes in front of the camera, the system instantly detects and recognizes it. A prototype was created and tested to evaluate the security functionality, effectiveness, and dependability. The findings indicate the result may be utilized effectively improve person's existence and safety, as well as for industrial and residential applications.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shankar B B, Harshitha Bhat, S. Poornima, R. Bharanidharan, M. Sridharan, Ayan Banik
{"title":"Conventional Protection of Power Transformers at Distribution Grid Side using Artificial Neural Network","authors":"Shankar B B, Harshitha Bhat, S. Poornima, R. Bharanidharan, M. Sridharan, Ayan Banik","doi":"10.1109/ICEARS56392.2023.10085631","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085631","url":null,"abstract":"A smart grid has a complex topology which includes multiple diversity of components. Power interruption due to faulty components has become a major issue in smart grid. It is difficult to obtain warning for faults that occur in each component. Also, the security of smart grid is under threat due to these unnoticeable faults. To improve the security of smart grid, it is essential to develop an efficient fault detection technique. Hence, an attempt is made to determine the transmission line faults that occur in smart grids using Artificial Neural Networks. The proposal is simulated using MATLAB SIMULINK and the results confirm the supremacy of the proposal over other approaches.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115349200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gesmond George Manuval, Thomas T George, Bilha P Aby, Mohith Mathew, Ayush Sarath Chandran, N. Jayapandian
{"title":"Machine Learning based Candidate Recommendation System using Bayesian Model","authors":"Gesmond George Manuval, Thomas T George, Bilha P Aby, Mohith Mathew, Ayush Sarath Chandran, N. Jayapandian","doi":"10.1109/ICEARS56392.2023.10085615","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085615","url":null,"abstract":"Online websites that recommend books, music, movies, and other media are becoming increasingly prevalent because of collaborative filtering. This online websites are using many algorithms to provide the better recommendation to attract the customer. Bayesian statistics, which is based on Bayes' theorem, is a technique for data analysis in which observable data are used to update the parameters of a statistical model. To discuss a strategy called item-based collaborative filtering, which bases predictions on the similarities between the said objects. This uses Machine Learning based Candidate Recommendation System which uses Bayesian Model database to assess the proposed method. The actual results show that for collaborative filtering which is based on correlation, the Bayesian techniques we have proposed outperform traditional algorithms. Also discuss a technique for improving prediction accuracy that combines the Simple Bayesian Classifier with user- and item-based collaborative filtering. The user-based recommendation is then applied to the matrix once the user-item rating matrix has been filled out with pseudo-scores produced by the item-based filter. This model is demonstrated that the combined approach outperforms the individual collaborative recommendation approach. The creation of UI based web application will help Students to manage achievement details. Job seekers and admin will be given a separately formatted version of the application where, students can upload and view their certificate, wherein admin can access student achievement details categorized by different parameters. This proposed model is developed under the service learning scheme to benefit both job seeker and recruiter.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115605939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Different Methods used to Clean Solar Panel Surface","authors":"Arti Badhoutiya","doi":"10.1109/ICEARS56392.2023.10085478","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085478","url":null,"abstract":"The proportion of irradiation that can flow through the panel glass is referred to as the transmitted light. Because of the increased dust content on the glass surface, less light can pass through, due to the covered area by dust. Human labor, cleaning mops, and foreign - made solar cleaning robots are typically used to clean solar panels. The suggested cleaning method consists of four steps and doesn’t make use of any liquids. Spraying with compressed air is the first step in the dust removal process, which is then followed by a moving roller wiping the panel glass. The rollers are held and moved all along solar panels by an electronically controlled mechanical assembly. The arrangement has a set of servo motors equipped for the motion of whole setup along the length of panel. The proposed model is devised on a single panel. Its operating mechanism is repeated after every 24 hours. It is clear from the obtained results that the power output has been increased by implementing such panel glass cleaning techniques.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116297833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dual Control of Single-Phase Grid-Connected PV System for Harmonics Mitigation","authors":"Bhagya Lakshmi Badela, Srinivas Vudumudi, Narasimha Rao Kolipaka","doi":"10.1109/ICEARS56392.2023.10085052","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085052","url":null,"abstract":"The widespread adaptation of distributed generations (DGs), such as solar photovoltaic (PV) systems, wind generation etc., is rapidly becoming a necessity in response to rising energy demands. Imbalance of DC input and AC output powers causes grid voltage imbalance at the end of DC-link voltage in a single-phase two-stage grid-connected PV system. The power quality is compromised by this voltage imbalance. One issue brought on by double-frequency oscillations, and grid-voltage imbalance is a harmonic disruption in the grid-injected current. This paper's objective is to design dual controllers to reduce harmonic distortion at the grid side by extracting maximum power output from the PV array via the Maximum Power Point Tracking (MPPT) algorithm. All of the modellings are done in the MATLAB/SIMULINK environment. The controllers used to reduce harmonic distortion and boost power quality are demonstrated by simulation results to be effective.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"36 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain for Securing Autonomous Vehicles","authors":"S. Rajendar, Udhayakumar Thangavel, Sarvesh Devendran, Vaishnavi Selvi, Shanmuga Sundaram Muthumanickam","doi":"10.1109/ICEARS56392.2023.10085685","DOIUrl":"https://doi.org/10.1109/ICEARS56392.2023.10085685","url":null,"abstract":"Autonomous Vehicles (AVs) are perceived as a revolutionary development in the worldwide transport sector and are believed to enhance safety significantly. An AV is equipped with a range of advanced technologies that allow it to communicate with other vehicles, as well as with various other systems and infrastructure such as traffic lights, road signs, and other Road-Side Units (RSUs). AVs also employ a variety of communication channels for their operation and safety. The major concerns in such communication channels are reliability, precision, and security of received and broadcasted data. These concerns directly affect the safety and security aspects of an AV which endangers the passenger safety. Thus, AVs require a secure mechanism for the exchange of crucial data. This paper explores the utilization of blockchain technology in AV communication, enabling authorized access to data, facilitating secure data sharing among vehicles and RSUs, tracking the internal status of the vehicle for In-Vehicle Network (IVN) breaches, along with the architecture of the system. Moreover, the paper outlines the implementation challenges and future research of blockchain technology in AVs.","PeriodicalId":338611,"journal":{"name":"2023 Second International Conference on Electronics and Renewable Systems (ICEARS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128183031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}