{"title":"Simulation of Power Optimum circuits for 15*(3×3) Piezo Array Installation","authors":"Karthikeyan P. Saravanan, Arulmozhiyal Ramaswamy","doi":"10.1109/ICCPC55978.2022.10072170","DOIUrl":"https://doi.org/10.1109/ICCPC55978.2022.10072170","url":null,"abstract":"The main motive of this project is to improve the output level of piezo arrays using a continuous mode of DC-DC converter. Many countries get their electrical energy from renewable sources because renewable sources are less harmful to the environment. In general, the conversion of solar and wind energy plays an energetic role in renewable energy sources, but both energy conversion processes depend on geographic location and weather conditions. Kinetic energy is available in many forms in the environment. One well-known example of kinetic energy is wind energy conversion but cannot be applied everywhere. Other kinetic energy conversions also present in our day-to-day life. Examples include piezoelectricity from step energy generation and mechanical vibration rectifiers [MVR] from railways. All of these energy conversions are less powerful due to the amount of kinetic energy available and the mechanical structure of the material. Therefore, in this project we will model a piezo array with boost converter operation to optimize voltage levels. Total energy conversion process modeled and verified by using MATLAB-SIMULINK platform.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Keerthana S, Sathiya A, Aswini P, Nithiya Shree C J, Sakthi Meenakshi A
{"title":"Stromal Bestower","authors":"Keerthana S, Sathiya A, Aswini P, Nithiya Shree C J, Sakthi Meenakshi A","doi":"10.1109/ICCPC55978.2022.10072219","DOIUrl":"https://doi.org/10.1109/ICCPC55978.2022.10072219","url":null,"abstract":"A stem cell is an obligate intracellular that can give rise to other cells that eventually form specialized organs and tissues in living beings. The two main categories of stem cells were mature and adolescent. The central mass of a blastocyst, an embryo in its very early stages of development, contains embryonic stem cells, which eventually give rise to every kind of cell in an adult organism. Blood- forming adult stem cells are frequently removed from the bone marrow during cancer treatment, preserved, and injected into patients to replenish cells lost to radiation therapy or chemotherapy. The possibility of employing embryonic stem cells to treat various illnesses, including Parkinson's disease, severe burns, and damage to the heart, has sparked a strong interest. However, there is a demand for donating stem cells and finding them for a proper donor. If there were places like stem cell institutions, there were of money minded in such cases, this fails here. So, in that case, this project will provide a solution for finding the perfect donor by the seeker itself through a common portal using a website by which both the donor and the seeker encounter each other alongside; furthermore, their intentions will become fruitful.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127377925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. M, Gunasundari S, Josephine Ruth Fenitha, Sanchana R
{"title":"Fight Detection in surveillance video dataset versus real time surveillance video using 3DCNN and CNN-LSTM","authors":"S. M, Gunasundari S, Josephine Ruth Fenitha, Sanchana R","doi":"10.1109/ICCPC55978.2022.10072291","DOIUrl":"https://doi.org/10.1109/ICCPC55978.2022.10072291","url":null,"abstract":"The abundant presence of surveillance cameras result in huge volumes of video data, which need to be monitored constantly. Real time fight detection from surveillance videos will help in preventing or stopping the fight. Fights in parking lots, bars, restaurants and public places can be avoided if there is a system that does real time detection. The proposed system compares the fight detection accuracy in surveillance video dataset by applying two approaches namely 3DCNN – Three Dimensional Convolutional Neural Network and CNN-LSTM- Long Short Term Memory network. The Surveillance Camera Fight dataset is used in this work for fight detection. 3DCNN and CNN-LSTM provide 86% and 87% accuracy respectively in classifying fight actions with the test dataset. The proposed work also includes survey and analysis of fight detection using the real time streaming surveillance video. The proposed model is tested on webcam streaming device which captures the video in real time, preprocessed and analyzed using both 3DCNN and CNN-LSTM prebuilt trained models. The real time fight detection ended up with significantly fairer accuracy with lots of challenges in implementation.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124924997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. G. Vidhya, J. Seetha, Sudhir Ramadass, S. Dilipkumar, A. Sundaram, G. Saritha
{"title":"An Efficient Algorithm to Classify the Mitotic Cell using Ant Colony Algorithm","authors":"R. G. Vidhya, J. Seetha, Sudhir Ramadass, S. Dilipkumar, A. Sundaram, G. Saritha","doi":"10.1109/ICCPC55978.2022.10072277","DOIUrl":"https://doi.org/10.1109/ICCPC55978.2022.10072277","url":null,"abstract":"Cancer that originates in the breast tissue then spreads to the chest wall is called breast cancer. Doctors routinely examine mammograms for signs of cancer; however, aberrant macrocalcifications and microcalcifications might appear on mammograms when the picture quality is subpar. Always get checked out if you see anything out of the ordinary, especially if it involves your breasts, such abnormal calcium deposits. For this mammographic deposit to be properly interpreted, top-notch picture quality is necessary. Many different breast cancer screening methods and the many breast cancer phases are still the subject of active study. In order to construct effective medical image processing systems, experts use methods including the Ant Colony Algorithm (ACA), the Improved Adaptive Fuzzy C-Means (IAFCM), and TNM (the size of the breast tumor (T), the lymph nodes around the tumor, and metastasized). Classes were determined using an MPIG, or a modified Poisson inverse gradient classifier. More than five hundred picture modalities are used across all methods. Medical professionals that rely on images to establish diagnoses or treatments might find the results of this research useful.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124154011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prescriptive Analytics for finding the optimal manufacturing practice based on the simulation models of Lean Manufacturing and Total Quality Management","authors":"Amadu Mohammed Faisal, L. Karthigeyan","doi":"10.1109/ICCPC55978.2022.10072201","DOIUrl":"https://doi.org/10.1109/ICCPC55978.2022.10072201","url":null,"abstract":"The manufacturing practices such as Lean Manufacturing (LM) and Total Quality Management (TQM) will take several years for the implementation at the operational level. There is a requirement of huge investment for the implementation of LM and TQM. Hence, most of the companies are unable to implement the LM and TQM at the operational level. The key obstacles of huge investment and time consumption for finding the optimal manufacturing practice can be overcome by using Prescriptive analytics. In the field of analytics, the prescriptive analytics can be performed using the simulation to find the optimal manufacturing practice. This paper aims at finding the optimal manufacturing practice from the prescriptive models such as LM and TQM simulation models. The simulation model of LM and TQM is evaluated to find the optimal manufacturing practice according to the variables and mean key performance indicators (KPIs). Based on the simulation analysis, the mean utilization found to be better for both LM and TQM. But it indicates that TQM are unable to produce more throughputs due to more time needed for processing. Hence the LM is found to be the optimal manufacturing practice because of lean principles such as Muda for reduction in unnecessary time and Pull system for reduction in mean WIP inventory that leads to increase in mean throughput. The sustainable framework of LM implementation needs to be developed based on the lean principles such as Muda and Pull system.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121072733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Valarmathi, T. Sathya, J. Nirmala, S. Sivarajeswari, R. Prasanth, V. Srihari
{"title":"Design and Implementation of Secured Contactless Doorbell using IOT","authors":"V. Valarmathi, T. Sathya, J. Nirmala, S. Sivarajeswari, R. Prasanth, V. Srihari","doi":"10.1109/ICCPC55978.2022.10072073","DOIUrl":"https://doi.org/10.1109/ICCPC55978.2022.10072073","url":null,"abstract":"In this pandemic era there is a need for improved methods for contactless methods and improved technologies. We have to implement an associated M-App for contemporary house security. The “Contactless Doorbell” acknowledges an individual person standing at a set distance of 1m-2m before of the camera at that time an arduino signal is initated which in turn initiates to ring the autonomous door bell and also it initiates the Nodemcu Camera module to take the snap of the face and sends the captured image to the M-application and stored in the firebase. To build this contactless button we tend to use Arduino, NodeMCU Camera module, ultrasonic sensing element and extend the utilization of database management systems, JAVA, Computer Vision and AWS cloud services.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121368379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Goud, Vineetha Varghese, Komal B Umare, J. Surendiran, R. G. Vidhya, K. Sathish
{"title":"Internet of Things-based infrastructure for the accelerated charging of electric vehicles","authors":"D. Goud, Vineetha Varghese, Komal B Umare, J. Surendiran, R. G. Vidhya, K. Sathish","doi":"10.1109/ICCPC55978.2022.10072086","DOIUrl":"https://doi.org/10.1109/ICCPC55978.2022.10072086","url":null,"abstract":"In this study, it is presented an intelligent process-based design for an electric vehicle (EV) charging procedure generation and management system. Due to the restrictions of electrical power distribution, charging of electric cars must be done effectively. Modern characteristics of the suggested smart electric car charging station include the ability to switch sources automatically depending on the availability of each source while still sustaining power from several sources. In this implementation, we are using three sources: the solar system, the wind system, and the main supply. The controller will automatically switch the source based on its importance. Users of the IOT Thing Speak cloud service will be able to see how many vacant spaces there are.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Geethalakshmi, H. M. Moyeenudin, S. Bhavya, S. Lokesh, V. Sriram, A. Anand
{"title":"Application of Queuing System using Fuzzy Approximation Method in a Departmental Store","authors":"M. Geethalakshmi, H. M. Moyeenudin, S. Bhavya, S. Lokesh, V. Sriram, A. Anand","doi":"10.1109/ICCPC55978.2022.10072262","DOIUrl":"https://doi.org/10.1109/ICCPC55978.2022.10072262","url":null,"abstract":"This paper deals with the systematic study on queueing systems and an application of queuing model. Here, the single stage queuing model with single queue and multiple servers is considered as a real time illustration. The average number of consumers in the system and in the queue along with the average waiting time of the consumers in the system and in the queue is calculated in a departmental store. The results are observed in various time intervals and the analysis is done for five different days using five different counters (servers). Finally, a comparative study on Last of Maxima method, Mean of Maxima method and fuzzy approximation method is done for five days and the approximation curve is manipulated based on our study.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126314291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptocurrency: the good, the bad and the ugly","authors":"V. Anandhabalaji, M. Babu, E. Anandhi","doi":"10.1109/ICCPC55978.2022.10072283","DOIUrl":"https://doi.org/10.1109/ICCPC55978.2022.10072283","url":null,"abstract":"Cryptocurrency is the technological development of currency into the digital form which is considered for sustainable development. There are large numbers of investors, who have started investing on cryptocurrency and it is the emerging financial market across the globe. But the cryptocurrency poses various threats to the investor safety and security and it is hazardous to the environmental condition. There is still no consensus on cryptocurrency whether it is a better option to invest or not. Hence this studies to shed light on to the path of investment opinion about cryptocurrency. This paper will give the perspective of the current trends in the crypto market. This concept will be discussed through three steps: the good cryptocurrency and how the financial market has evolved into the digital technology and secondly now it could emerge as a sustainable development in the field of finance. Hence the technology encourages the development of investor and green cryptocurrency. There are various individual issues, related to bad cryptocurrency like money laundering, scam, crypto whale and viruses. Finally, the ugly cryptocurrency in the financial sector affects the environmental condition and how it could affect the ecosystem of the planet due to crypto mining. This study suggested the token offering organization to adopt the proof-of-authority process than the proof-of-work, to avoid carbon emission and more volume of energy consumption. This study also suggests the investor to invest on the green cryptocurrency than the hazardous cryptocurrency (bitcoin), which affects the environmental condition.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126062384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Devi V Brindha, R. Prabavathi, P. Subha, Mohana S Saranya, Meenaloshini
{"title":"Women Safety App for Detecting the Stalkers behavior","authors":"Devi V Brindha, R. Prabavathi, P. Subha, Mohana S Saranya, Meenaloshini","doi":"10.1109/ICCPC55978.2022.10072281","DOIUrl":"https://doi.org/10.1109/ICCPC55978.2022.10072281","url":null,"abstract":"It is common that everyday women are dealing with harassment from mild to extreme forms on our streets. Women's rights must be pushed in every lobby until we are forced to give in and take action against the crisis that hangs over us from every street and corner. Women's safety has become a topic of importance. The significance of acting in a proper manner toward women has been the subject of a heated national discussion in response to recent incidents of workplace harassment. It is up to us to get up and do whatever action is necessary since we have few alternatives and time is passing quickly. In this paper, we propose a facility to monitor the stalkers using facial recognition algorithms. This system can also provide a facility for developing an application that is linked to your Smartphone via its IP address. This facial recognition is carried out by using a camera module which can also be used as a wearable according to the user's Convenience.","PeriodicalId":367848,"journal":{"name":"2022 International Conference on Computer, Power and Communications (ICCPC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122020581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}