{"title":"Frequency Response Analysis of Octagonal Complementary Split Ring Resonator-Based Metamaterial","authors":"S. K, E. B, Nandha Kumar T K, Lavanya B","doi":"10.1109/ICIIET55458.2022.9967658","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967658","url":null,"abstract":"Terahertz (THz) study experienced a remarkable advance in recent years. THz filters are utilized for controlling THz signals in the applications of the THz region. The difficulties in designing THz filters are their higher bandwidth, changeable resonance frequency, low return loss, and low insertion loss. This article examines the frequency response of a metamaterial based on an octagonal complementary split ring resonator (O-CSRR). The proposed O-CSRR is simulated on COMSOL Multiphysics. The results display good performance on filter parameters like resonant frequency range 7.3 THz to 7.8 THz, 1.3 THzof 3-dB, -25.17 dB of return loss(RL), insertion loss(IL) of 0 and transmittance of 100%. The proposed O-CSRR THz filter finds application in THz communication, screening, imaging, etc.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132543962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Senthil Kumaran, K. Gayathri, K. Sheela, M. Jayasudha
{"title":"Efficient Data Gathering and Routing Scheme Using Multiple Mobile Sink in Wireless Sensor Networks","authors":"R. Senthil Kumaran, K. Gayathri, K. Sheela, M. Jayasudha","doi":"10.1109/ICIIET55458.2022.9967643","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967643","url":null,"abstract":"WSN is often a technology used within an IoT system that assists in monitoring, tracking, and sensing different environmental activities when WSN is integrated into the IoT. They faced a major challenge due to excessive energy ingesting in their sensor nodes and network lifetime. Therefore, the fundamental issues in WSN are high energy consumption in nodes, packet delivery, routing distance, and packet delay. An energy-effective routing scheme that encompasses the system’s generation and recovers its performance and connectivity. Primarily, the sensing region is segregated into different regions depending on the organized sinks and deployed sensor nodes using random deployment. To locate the ideal location for the sinks and accumulate the information from sensor nodes, a sojourn location determination algorithm is constructed finally, using multi-objective evolutionary algorithms, sojourn location determination algorithms are used to analyze the optimized mobile sink paths. While the proposed work’s performance was assessed in terms of energy consumption, throughput, packet delivered ratio, packet loss, average routing length, and accomplishment time of the sinks Algorithms for determining sojourn location.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131357053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analog single event on low noise amplifier with no source inductor","authors":"P. Rajendiran","doi":"10.1109/ICIIET55458.2022.9967601","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967601","url":null,"abstract":"This article explores the analog single event transient (analog-SET) performance of a cascoded RF (radio frequency) low noise amplifier (LNA) with no source inductor through numerical device simulations. Two different scenarios are used to carry out radiation on LNA studies; (i) no-RF signal is applied (only bias); and in addition, (ii) RF signal with bias. In the first scenario, the collected charge $(mathrm{QC}_{oll})$ is evaluated in the time domain, whereas in the later scenario, the LNA output spectrum is examined in the frequency domain by using a spectrogram. The collected charge $(mathrm{QC}_{oll)}$ generated by the analog-SET (current or voltage) acts as a performance measure for determining the severity of the particles on the cascoded LNA’s common source topology (CS) and common gate topology (CG) devices. For the given LET (linear energy transfer) (MeV-cm2/ mg) value, the channel center L2 is the most vulnerable region in the common gate stage, and the same is true for the susceptible device in cascoded LNA","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123754289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptocurrency Value Prediction with Boosting Models","authors":"S. Swati, Anuraj Mohan","doi":"10.1109/ICIIET55458.2022.9967540","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967540","url":null,"abstract":"Ensemble learning is a methodology that entails integrating a number of inefficient entities to achieve significantly improved performance. Boosting is a significant category of ensemble learning that involves the consecutive aggregate input of weak learners. The benefits of boosting approaches in processing tabular data with a significant quantity of information and resistance to overfitting can be very useful in estimating the market value of digital currency or cryptocurrency. The goal of this work is to examine and comprehend the capabilities of major boosting techniques such as XGBoost, AdaBoost, and CatBoost in cryptocurrency forecasting. The work examines the long-term forecasts of two major cryptocurrencies, Bitcoin and Ripple, for this purpose. The results indicate that AdaBoost and XGBoost have comparable predicting efficiency, followed by CatBoost. This implies that AdaBoost’s simpler boosting strategy is effective at achieving outcomes that are comparable to those of more recent boosting algorithms like XGBoost and CatBoost. The study has emphasized the similarities in achieving the best cryptocurrency prediction outcomes from each model. According to the research, a more straightforward boosting tactic is just as effective as or even more effective than the other most recent boosting strategies.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129419601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Four-Port Cylindrical DRA based MIMO Antenna for WLAN Application","authors":"Priyesh Kumar, Gouri Sharma, Anshul Gupta","doi":"10.1109/ICIIET55458.2022.9967503","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967503","url":null,"abstract":"This paper presents a C-shape aperture coupled four-port cylindrical dielectric resonator (DR) based multiple input multiple output (MIMO) antenna. The proposed geometry consists of four orthogonally placed CDRAs, to achieve minimum isolation of -28dB between the ports. The size of CDRAs is chosen such that it covers the frequency range 5.09GHz – 5.93GHz for the 5.62GHz WLAN application. Two orthogonal modes and were excited in the CDRAs by incorporating a C-shaped aperture.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115506526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Logic Locking Technique with Observability Measures to Thwart Hardware Trojans","authors":"M. Priyadharshini, P. Saravanan","doi":"10.1109/ICIIET55458.2022.9967523","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967523","url":null,"abstract":"Hardware attacks like the overproduction of integrated circuits, intellectual property piracy, reverse engineering, and hardware trojans are major threats for long years. To safeguard critical circuits from these threats, encrypting the circuit from attackers is the only way. In this paper, among the testability measures, the observability values are considered a key parameter for performing the logic locking. Detecting the nets with low observability values and improving the values make those net signal values harder to observe by the attacker and in addition obfuscates the circuit. The experiment is performed on ISCAS’85 benchmark circuits and it is ensured the circuits are locked with a secret key. The testability measurement tool is used to extract the observability measures of the benchmark circuits.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"63 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114086545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification and Analysis of Epileptic Seizure","authors":"Vs Rhoshnee, S. N. Devi","doi":"10.1109/ICIIET55458.2022.9967572","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967572","url":null,"abstract":"Epilepsy is a neurological disease where nearly fifty million people are affected all around the world. EEG plays a critical role in monitoring the brain activity of patients with epilepsy and also plays a significant role in diagnosing Epilepsy. Epileptic seizures are life-threatening since it causes severe damage to the brain of the patient. There are five different kinds of frequency bands in EEG signals. Features extraction plays a significant role in the effectiveness of EEG-based Epileptic seizure detection. The analysis involves using prominent features which are extracted from the signals. Classification is done using machine learning techniques, among various machine learning algorithms Nonlinear SVMs are found to have the highest accuracy of 96.25% when compared to that linear SVM.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123565047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning based Robust Techniques to Detect DDoS Attacks in WSN","authors":"Chandan, Sachin Kumar, Somnath Sinha","doi":"10.1109/ICIIET55458.2022.9967543","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967543","url":null,"abstract":"One of the most hazardous threats in the current environment is DDOs attacks. It is challenging to identify and defend against these attacks since they are becoming more sophisticated and more frequent every day. So it’s important to identify and prevent such type of attack before any impact. In this study, research on a new dataset of DDoS attacks which includes HTTP Flood attacks, and UDP Flood is conducted.SVM, KNN, and Random Forest among other machine learning algorithms for classification are used in this work to classify nodes as malicious or non-malicious nodes. Additionally, Fuzzy inference rules are applied to malicious nodes classified by machine learning algorithms(SVM, KNN, and Random Forest)accurately identify nodes as highly malicious, moderate malicious, or nonmalicious. Finally using all the processed information a decision is made to eliminate all the highly malicious nodes. Moreover, we have created a dataset namely AVV-DDos2286 which will be made publicly available for further studies on DDO attacks. Our proposed method uses a better hybrid approach combining machine learning algorithms with Fuzzy logic systems which outperform conventional DDos attack detection systems implemented using stand-alone machine learning algorithms. The results obtained has an accuracy of about 94% for classification.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129081677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICIIET 2022 Cover Page","authors":"","doi":"10.1109/iciiet55458.2022.9967509","DOIUrl":"https://doi.org/10.1109/iciiet55458.2022.9967509","url":null,"abstract":"","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124538587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rahman, Vikas Tripathiy, A. Gupta, Biju Paul, Manju T. Kurian, Vinodh P. Vijayan
{"title":"Satellite Image Fusion for Obtaining High Resolution Images Using Deep Neural Network","authors":"A. Rahman, Vikas Tripathiy, A. Gupta, Biju Paul, Manju T. Kurian, Vinodh P. Vijayan","doi":"10.1109/ICIIET55458.2022.9967537","DOIUrl":"https://doi.org/10.1109/ICIIET55458.2022.9967537","url":null,"abstract":"Due to its critical function in a wide range of applications, scene categorization of high-resolution remote sensing (RS) photos has drawn increasing attention. A technique for spatiotemporal fusion using deep neural networks (DNNs) with a large amount of remote sensing data as the application background. An innovative multispectral image fusion architecture is proposed in this paper. The proposed method for fusing satellite images entails two phases, each using two neural networks. In the first stage, an adaptively weighted injection-based joints detailed approach to remotely sensed image fusion is discussed. Multispectral (MS) and panchromatic (PAN) images are used to extract spatial features using a wavelet transform. In contrast to the conventional detail injection technique, dictionary learning from the sub-images themselves is used to construct the primary joint details by sparsely representing the extracted features. To minimize spectrum distortions in the fused images while keeping spatial information, we implemented a unique loss function for this DNN. This network is known as the ’Spectral Reimbursement Network (SRN).’ Finally, using three datasets, full-reference, and limited-reference criterion, the proposed strategy is compared against several state-of-the-art methods. Experiment findings demonstrate that the suggested technique can compete in both spatial and spectral parameters.","PeriodicalId":341904,"journal":{"name":"2022 International Conference on Intelligent Innovations in Engineering and Technology (ICIIET)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128452062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}