{"title":"DBSCAN-R: A Machine Learning Approach for Routing in Opportunistic Networks","authors":"Rohan Pillai, Rashmi Rao, Ch Rajendra prasad, Apoorva Rao Iragavarapu, Annapurna D","doi":"10.1109/CONECCT55679.2022.9865751","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865751","url":null,"abstract":"Opportunistic networks(OppNets) are a subset of mobile IoT networks in which no direct connection can be established between a message’s source and its destination node. Instead, routing occurs through a collection of intermediate mobile nodes. The lack of a direct connection, along with the mobile nature of the nodes makes routing in OppNets a challenge. This paper aims to utilize machine learning to automate the routing process in Opportunistic networks. The proposed model is a context-aware protocol called DBSCAN-R. DBSCAN-R utilizes DBSCAN(Density-Based Clustering of Application with Noise), an unsupervised soft clustering algorithm to make routing choices. Four dynamic network parameters are chosen to use as features for clustering in DBSCAN. DBSCAN-R outperforms 3 benchmark algorithms i.e Epidemic routing, ProPHET routing, and MaxProp routing when comparing the delivery success rate, average hop count, overhead ratio, and messages dropped.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. S, Akshat Anand, Astha Vijayvargiya, Pushpalatha M, Vaishnavi Moorthy, Sumit Kumar, Harichandana Bss
{"title":"EmoSens: Emotion Recognition based on Sensor data analysis using LightGBM","authors":"G. S, Akshat Anand, Astha Vijayvargiya, Pushpalatha M, Vaishnavi Moorthy, Sumit Kumar, Harichandana Bss","doi":"10.1109/CONECCT55679.2022.9865753","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865753","url":null,"abstract":"Smart wearables have played an integral part in our day to day life.From recording ECG signals to analysing body fat composition,the smart wearables can do it all. The smart devices encompass various sensors which can be employed to derive meaningful information regarding the user’s physical and psychological conditions.Our approach focuses on employing such sensors to identify and obtain the variations in the mood of a user at a given instance through the use of supervised ma-chine learning techniques.The study examines the performance of various supervised learning models such as Decision Trees, Random Forests, XGBoost, LightGBM on the dataset. With our proposed model, we obtained a high recognition rate of 92.5% using XGBoost and LightGBM for 9 different emotion classes.By utilizing this, we aim to improvise and suggest methods to aid emotion recognition for better mental health analysis and mood monitoring.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127433949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simple Monopole ISM Band Antenna for On-body Wireless Communication in the Milimetre-Wave range","authors":"Sarosh Ahmad, Shuvra Barua, Y. A. Sheikh","doi":"10.1109/CONECCT55679.2022.9865814","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865814","url":null,"abstract":"The notion of a compressed size wearable flexible antenna for off-body links for wireless body area network (WBAN) applications is presented in this study. This proposed antenna resonates at 24.125GHz in the industrial, scientific and medical (ISM) band. The proposed antenna is a monopole antenna mounted on a Roger substrate with a modified ground that compresses the antenna profile. The ISM band was chosen because of its flexibility in terms of large bandwidth and modest antenna size. This antenna's key feature is its tiny size and flexibility, which makes it ideal for off-body transmission. The Rogers RO3010 is utilized as a substrate with dimensions of (8×6×0.12) mm3 and a loss tangent of 0.0022. When an antenna is placed near a human body, its performance, such as S11 and bandwidth, is reduced, and the results show that the compressed size antenna has a negligible influence when compared to rectangular antennas. This antenna has been shrunk and built for use in off-body communications. Furthermore, we will aim to improve the proposed antenna's gain and bandwidth, as well as the return loss when it is near a real phantom.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Performance Study of CNN-based Algorithms and YOLO","authors":"Rachit Mayur Shah, B. Sainath, Akshansh Gupta","doi":"10.1109/CONECCT55679.2022.9865820","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865820","url":null,"abstract":"Tasks such as image classification, object detection, to mention a few, play an important role in computer vision. Numerous algorithms have been developed to improve the performance of such tasks for benchmark datasets. Although advanced algorithms offer state-of-the-art performance on such tasks, it is also important to analyze their algorithmic feasibility over the time to make it practical for end-user applications. This paper analyzes two such groups of algorithms, namely, Convolutional Neural Networks (CNN) based algorithms with You Only Look Once (YOLO) in terms of speed and accuracy.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129073355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Non-linear State-space Affine Model of PMSM and Analysis of Its Dynamic Behavior Encompassing the Possibility of Chaos","authors":"Partha Roy, Susanta Ray","doi":"10.1109/CONECCT55679.2022.9865832","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865832","url":null,"abstract":"The objective of this paper is to develop a state space affine model of a permanent magnet synchronous motor (PMSM) to facilitate its behavioral study for different sets of parameters. The modeling is done in step-by-step manner with clear-cut explanation. First the two-axis d-q model is built. Then the model is transformed into state-space using affine transformation. The dynamic behavior of the dimensionless state-space variables is studied thereupon. A special investigation shows the probability of the chaotic behavior of the motor. The simulation results in MATLAB® environment demonstrate the effectiveness of the appraisals of this analysis.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130631165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intruder Detection and Tracking using 77GHz FMCW Radar and Camera Data","authors":"Vandana G S, Bethi Pardhasaradhi, P. Srihari","doi":"10.1109/CONECCT55679.2022.9865707","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865707","url":null,"abstract":"Target detection and tracking using optical and radar sensors have many applications in surveillance. As the optical sensor helps to visualize the target and the radar can provide its range and velocity, their combination results in useful information for continuous monitoring and coherence. This paper presents a radar-camera experimental setup to detect and track intruders in a restricted area. A real-time experiment with different target speeds and various radar cross-sections(RCS) (1. A person running, 2. A cyclist, and 3. A motorcyclist). We deployed a 77GHz IWR1642BOOST FMCW (Frequency Modulated Continuous Wave) radar module as a radar unit and a phone camera with an aperture of f/1.79 as an optical sensor. The data collected from the radar and camera sensor are applied to detection and tracking modules to obtain target tracks. The radar provides the observations of range, Doppler, and angle information. These observations are used to estimate the state of the target via extended Kalman filtering(EKF), dBscan clustering, and global nearest neighbor(GNN) association, followed by track maintenance. The optical sensor provides video frames as input and output tracks via foreground detection, blob analysis, motion-based detection, Kalman filtering, and track maintenance. The experimental result shows that combining radar and optical sensors accomplishes tracking accuracy and coherence in target detection and tracking.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"57 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130696220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comb-Shaped Patch Antenna Design Study with Shifted Arms and Asymmetric Architecture Enabling Controlled Resonance Change and Radiation Pattern","authors":"Melih Aslan, Huseyin Baydar, V. Kılıç","doi":"10.1109/CONECCT55679.2022.9865747","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865747","url":null,"abstract":"This paper reports comb-shaped patch antennas with asymmetrical geometries having two and three arms on the sides. The proposed geometry is evolved from regular rectangular shaped patch antenna by removing certain parts of the radiator patch and shifting the arms on one side of the antenna. Systematic simulations were obtained with the designed antennas for different arm shifting distances, and changes in resonance behavior and far-field radiation pattern were investigated. Results show that as the arm shifting increases the first and second resonance frequencies of the antennas decrease. Also, it is observed that the radiation occurs with two symmetric beams at the second resonance frequency of the designed antennas with no shift between the arms. However, as the arm shifting is applied the beam on the side of the arms closer to the feeding line gets stronger, whereas the other beam weakens. Obtained plots indicate that the directivity of the antennas have a tendency to increase with the arm shifting while the side lobe level decreases. In addition, results show that the half power beam width of the antenna increases with arm shifting. The simulations were repeated for different arm thicknesses and the same observations were held.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134520677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doppler Detection Capable Polyphase Good Code Sets Based on Linear FM Waveforms for MIMO Radar","authors":"Anjali Kadambi, Ravi Kadlimatti","doi":"10.1109/CONECCT55679.2022.9865786","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865786","url":null,"abstract":"This paper introduces polyphase good code sets based on frequency-shifted linear FM (LFM) waveforms. It is shown that the entire set can be received using a single extended matched filter, constructed by extending the LFM slope on either side and can detect the higher energy distribution within the filter before summation (i.e., the Hadamard product). This higher energy distribution location gives the frequency shift that could identify a particular set member or the Doppler shift of an LFM based polyphase code. The result is Doppler detection of an LFM based polyphase code or detection of a polyphase good code set consisting of frequency-shifted LFM waveforms. The frequency offset between the different members of the set is chosen such that the Doppler shifts of the individual code members could also be detected. It is shown that such good code sets could be constructed with polyphase codes based on up- chirps and down-chirps of varying slopes, which would require a bank of extended matched filters, one for each slope.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130290845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Scanning and Packaging of Shipments in Industries","authors":"Ravish Kumar Ojha, Koduru Suresh","doi":"10.1109/CONECCT55679.2022.9865743","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865743","url":null,"abstract":"Scanning devices are commonly used in warehouses or POS [Point of Sale terminals] to speed up data entry tasks and to minimize manual errors while recording the entries into the system. Users working with scanning devices to scan materials or packages usually perform the scanning activity in a large set of transactions each workday. The person working with the scanning device needs to do this activity in a repeated manner, continuously and with minimal deviations to optimize the performance output and efficiently manage the workload. Organizations look for ways to further optimize the processing time(s) to move the inventory faster while reducing the number of steps [iterations] to complete the scanning activity for a given set of activities. In this paper, a methodology that is designed and developed to optimize the scanning activity is being highlighted. Furthermore, an efficient way to pack, move the inventory faster, reduce the number of iterations and a performance evaluation is carried out with traditional approaches.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128498406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple countermeasure to mitigate buffer overflow attack using minimalistic hardware-integrated software simulation for FPGA","authors":"S. Sayeeshwari, E. Prabhu","doi":"10.1109/CONECCT55679.2022.9865767","DOIUrl":"https://doi.org/10.1109/CONECCT55679.2022.9865767","url":null,"abstract":"Buffer overflow attack in FPGAs is a persisting problem in the industry and various solutions to mitigate these vulnerabilities are continuously being addressed by manufacturers. A simple and effective mitigation method is proposed and simulated in Vivado using Verilog codes. Checking of bounds of the buffer memory, accompanied by using minimalistic number of logic gates as an encryption method, was simulated and demonstrated to successfully function as a strong countermeasure to this vulnerability.","PeriodicalId":380005,"journal":{"name":"2022 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128722057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}