R. Magadum, Balwant K. Patil, Vireshkumar G. Mathad, Sushil P. Patil
{"title":"A Comprehensive Literature Survey on Distributed Generation","authors":"R. Magadum, Balwant K. Patil, Vireshkumar G. Mathad, Sushil P. Patil","doi":"10.1109/ICCMC53470.2022.9753838","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753838","url":null,"abstract":"The electrical infrastructure are experiencing over burdening due to exponential growth in the power demand. In recent years, centralized power generating units losing interest due to more T&D loss, limitation in the expansion of generating capacity, poor ATC, environmental concerns etc. The efficient use of RES and their proper integration to the existing infrastructure plays key position in the entire augmentation of the network performance. Dispersed/distributed generation is part of the load is supplied by generating power at load premises to reduce the burden on the network by relieving the over loading on the electrical infrastructure. In this paper, the different types of DG, uses and benefits of DGs, Indian scenario, DG technologies and different optimization techniques exercised for DG placement and their limitations are discussed.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128344915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nan Chen, Ying Xiao, Zhijun Liu, Lirong Zhang, Ming-fei Qu
{"title":"Research on Digital Signal System of Coriolis Mass Flowmeter Based on Deep Learning","authors":"Nan Chen, Ying Xiao, Zhijun Liu, Lirong Zhang, Ming-fei Qu","doi":"10.1109/ICCMC53470.2022.9754120","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9754120","url":null,"abstract":"This paper mainly studies the Coriolis flowmeter signal enhancement and frequency estimation method of deep learning and the calculation method of Coriolis flowmeter signal time difference based on discrete Fourier transform and sliding Goertezl algorithm. According to the characteristics of Coriolis flowmeter signal, a Coriolis flowmeter time-varying signal model based on random walk model is proposed. The proposal of the model and the research on its related signal processing methods. The signal enhancement and frequency estimation methods of the direct HR adapti ve spectral line enhancer are used, and the implementation of the algorithm under the time-invariant and time-varying signal models are respectively given.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lung Cancer Prediction using Extended KNN Algorithm","authors":"E. Ajitha, B. Diwan, M. Roshini","doi":"10.1109/ICCMC53470.2022.9753689","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753689","url":null,"abstract":"Among several different types of cancer the one that causes high mortality in every country is lung carcinoma. The possibility of survival from this deadly disease can be enhanced by identifying cancer at an early stage. This paper focuses on an Extended version of the KNN Algorithm that is used for the prediction of lung carcinoma based on the Computed Tomography (CT) - Images given as the input. The 2-D image undergoes a Modified Gabor Filtration technique wherein the images are used to extract the features for Edge Detection. This further undergoes Feature Extraction followed by Binarization which is fed as Production data to the Machine Learning model. Based on the Extended KNN Algorithm, the model evaluates the testing data and corresponding predictions are made. The model predicts the Cancer Stage based on the input CT - Image which is passed to the doctor for further medication.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134126104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Functions and Ways of Computer Information Technology in Optimizing Library Operation and Management Considering Massive Data Mining","authors":"J. Song","doi":"10.1109/ICCMC53470.2022.9754122","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9754122","url":null,"abstract":"With the continuous development of science and technology, the application of computer information technology in various fields has become more and more extensive, and the world is entering the information age. The development and application of information technology has brought new opportunities and challenges to library management. This article combines the concept of library information technology, analyzes the challenges of library management under information technology, and then proposes the practical application of information technology in library management, and reviews in detail the research status of the massive data mining process and Faced with challenges, and discussed the processing mode in the process of massive data mining from the perspective of game theory, granular computing model and big data processing thinking.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"502 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131951214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Binary descriptors for Copy-Move Forgery Detection in Digital Photographs","authors":"S. Velmurugan, T. Subashini","doi":"10.1109/ICCMC53470.2022.9753970","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753970","url":null,"abstract":"Today, image forensic is an emerging area which aims at authenticating the credibility of an image. Sophisticating image editing tools make it easy to forge images in different ways and one amongst them is copy-move (CM) forgery which is considered in this paper. CM forgery modifies the content of an image by copying a portion of an image and pasting it in a distinct location in the similar image. Fraudsters, in order to conceal the fraud and to deceive the human eyes, sometimes do some post-processing operations such as rotation, scaling, multiple CM, etc. The widely used block-based methods for CM forgery detection are not robust enough to affine transformation and are not invariant to scaling, rotation, and noise. So, in this work, key-point-based CM forgery detection methods based on BRISK and ORB descriptors are proposed for detecting CM forgeries in digital images. The presented methods are dependent upon blobs, detecting using DoG operator, from which BRISK and ORB features are extracted. The extracted features are matched using Hamming distance metrics to find similar key points to identify the CM regions. The work was implemented in Python and synthesized images were used in this to analyze and compare the efficacy of the presented techniques. The experimental outcomes demonstrates that the presented technique was effectual for multi-CM attacks and geometric transformations namely rotation and scaling. Though both the methods were able to detect the CM forgeries efficiently, ORB executed faster compared to BRISK.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"430 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132245601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of various Image Mining Techniques","authors":"C. Kavitha, D. Balaganesh, M. Sukumar, J. Mathan","doi":"10.1109/ICCMC53470.2022.9753743","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753743","url":null,"abstract":"One of the easiest ways of communication is possible through interpreting wide range of images on various applications. It is the non-structural data that does not have clear semantics. Image mining techniques implemented on the images are used to extract features/train the real time systems. This can be achieved using combination of various algorithms of image processing, machine learning and artificial intelligence. This paper discusses about those image mining techniques and the challenges faced by various researchers.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123025765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble Learning using Vision Transformer and Convolutional Networks for Person Re-ID","authors":"A. Gupta, Neil Gautam, D. Vishwakarma","doi":"10.1109/ICCMC53470.2022.9753761","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753761","url":null,"abstract":"Person Re-Identification is the process of recognizing a targeted individual across multiple views at different times, in different and challenging real-life diverse settings. It remains a conundrum due to the significant amount of intra-class variation present in same individual caught across different cameras. Most of the existing models require a large amount of data for training, as a result of which they do not generalize well on small datasets and hence decreases the robustness of the identification process. To reduce this variance, this paper introduces an end-to-end triple stream ensemble model making minimal changes in the Vision Transformer, Resnet50 and Densenet121 architectures respectively. Our model performs well on the Market1501 dataset achieving an accuracy of 90.05% and 80.45% on the Duke MTMC ReID dataset.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127763954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Modern Deep Learning based Generative Adversarial Networks (GANs)","authors":"Pradhyumna P Mohana","doi":"10.1109/ICCMC53470.2022.9753782","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753782","url":null,"abstract":"GANs (Generative Adversarial Networks) are a type of deep learning generative model that has lately gained popularity in recent years. GANs can learn patterns from high-dimensional complex data, making them useful for image, audio and video processing. Nonetheless, there are several significant obstacles in the training of GANs, such as instability, mode collapse and non-convergence. To address these issues, researchers have developed a variety of GAN variations by rethinking network topology, modifying the form of goal functions, and changing optimization to precise methods in recent years. This paper describes a thorough analysis of the progress of GAN architecture and optimization solutions to improve its efficiency in various computer vision applications and challenges that are to be faced while implementing the model towards CV (computer vision) is described. It is believed that GAN is strong model and further researches are needed to work in this area to solve a variety of computer vision real time applications.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121350367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application to Pedestrian Detection and Object Detection","authors":"V. Swetha, K. Sushma, N. D. Praneetha, S. Mahesh","doi":"10.1109/ICCMC53470.2022.9753908","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753908","url":null,"abstract":"Automatic driving systems, object detection is essential. A logic of fusion presented combining the benefits of these two types detectors of objects, taking into account the properties of classical and deep learning techniques. Theoretically, a link between detection performance and detector type can be established. The numerical study to increase detection performance is based on the established theoretical relationship. In addition, an enhancement strategy is proposed that the designs of the sub-detectors are guided by this principle for improved overall performance. The utility of this combination methodology is illustrated in the identification of pedestrians using a trained by a machine on attribute the conventional detectors or human being. On the training datasets as well as additional different datasets to complete several comparative experiments using the classical and CNN detectors have been undertaken. It is a guarantee to improve detection performance and flexibility to different application settings with a simplified network.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128960429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Shovon Uz Zaman Siddique, Siddhartha Mohammad, Tapesh Bhowmick, Mohammad Monirujjaman Khan, Rajesh Dey
{"title":"Development of Low-cost GPS Tracker System for Coastal Area of Bangladesh","authors":"Md. Shovon Uz Zaman Siddique, Siddhartha Mohammad, Tapesh Bhowmick, Mohammad Monirujjaman Khan, Rajesh Dey","doi":"10.1109/ICCMC53470.2022.9754036","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9754036","url":null,"abstract":"The aim of this paper is to build a GPS tracker at a very low cost so that it can be used by a lot of people in coastal areas. The main objective of the low-cost GPS tracker is used to track down ships/shipments for the coastal area people of Bangladesh. It will show the position of the people when they are in the sea for fishing so that they do not cross the border of their country. Sometimes fishermen or other people in the sea cannot identify that they have crossed the border of the country. This device is proposed for them so that they know their position in the sea. The GPS tracker system has an alarm as well which will notify the user when it crosses the coastal boundary of Bangladesh. It has been seen that there are many existing GPS trackers in the market. The available GPS trackers are in the range of 3000 BDT and above whereas the low-cost GPS tracker proposed in this project will cost around 1600 BDT. The addition of the buzzer and the website on the low-cost GPS Tracker will be a revolution in the coastal areas of Bangladesh. With the large production of the low-cost GPS Tracker, the pricing per unit will be lowered considerably. The proposed prototype of the GPS tracker if went through different combinational parts will cost even lower and this will be worked on in the future to further reduce the cost.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128800734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}