2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)最新文献

筛选
英文 中文
Role of Nano-Sensors towards CO2 Concentrations in an Indoor Classroom Environment to improve Occupational Health 纳米传感器对室内教室环境中二氧化碳浓度的作用,以改善职业健康
Lakshaga Jyothi. M, Shanmugasundaram R. S.
{"title":"Role of Nano-Sensors towards CO2 Concentrations in an Indoor Classroom Environment to improve Occupational Health","authors":"Lakshaga Jyothi. M, Shanmugasundaram R. S.","doi":"10.1109/icdcece53908.2022.9792733","DOIUrl":"https://doi.org/10.1109/icdcece53908.2022.9792733","url":null,"abstract":"Indoor ventilation is trivial in the current scenario of the COVID-19 pandemic in the workplace and public places. To support humans by preventing various airborne infectious diseases in the indoor environment, this work elaborates on measuring the CO2 concentrations in indoor classroom use through the sensors. It can differentiate between various changes in the environment. Due to advancements in nanotechnology and microcontroller systems, the traditional usage of sensors has moved way beyond its reach in a diverse set of fields. Electrochemical gas sensors like MQ series sensors consist of nano-materials fabricated to define characteristics like sensitivity, selectivity, etc. Using these nano-science and nano-electronics technologies, a low-cost prototype with Arduino UNO, and a few other micro-sensors (DHT11, MQ2, MQ135) to measure environmental parameters like temperature, humidity, carbon dioxide, and smoke and thus ensure a healthy workspace by continuously monitoring the readings in real-time. Classroom Environments may face various challenges in the pandemic situation where there is a massive density of occupancy as well as poor ventilation rates. The outdoor ventilation of the classroom is far more challenging than the indoor environment. The results reveal that this system can provide effective indoor monitoring and assessment for prohibiting harmful exposures and risk factors. Data analysis shows the correlation between humidity and quality of air based on CO2 concentrations. Poor ventilation can be lessened by reducing Air Conditioning systems and figuring out the pollutants present in the classroom environment benefiting the users with respiratory illness.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128344177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Awareness About Phishing Attack And Fake News Using Machine Learning Technique 利用机器学习技术防范网络钓鱼攻击和假新闻
Kripakrishna R K, C. A
{"title":"An Awareness About Phishing Attack And Fake News Using Machine Learning Technique","authors":"Kripakrishna R K, C. A","doi":"10.1109/icdcece53908.2022.9793225","DOIUrl":"https://doi.org/10.1109/icdcece53908.2022.9793225","url":null,"abstract":"In this decade Social Media platforms and online websites plays an important role in bringing people together, gathering information and easy way for transferring the information. Social media news consumption provides both positive and negative impacts to this world. News is spreading rapidly using social media. On the other hand, it facilitates the spread of fake news. Wrong, and untruthful information. The phishing is one of the serious cyber threats to people's everyday lives and the internet environment in these attacks, the attacker impersonates a trusted entity with the intent of stealing sensitive information or the user's digital identity, such as account information, credit card and debit card numbers, CVV, pin and other user details. Therefore, Phishing website and fake news detection is an important need in our society. In this project phishing website detection is proposed using Logistic Regression and Naïve Bayes machine learning algorithms. Tf-idfVectorizer, CountVectorizer, Logistic Regression, Decision Tree Classifier and Random Forest Classifier are used for detecting the fake news.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128879241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
iMight: A Social Group E-wallet With The QR Code and Fingerprint Recognition Technologies iMight:一个带有二维码和指纹识别技术的社交团体电子钱包
Mien May Chong, Chandra Reka Ramachandiran, Tang Ye Huang
{"title":"iMight: A Social Group E-wallet With The QR Code and Fingerprint Recognition Technologies","authors":"Mien May Chong, Chandra Reka Ramachandiran, Tang Ye Huang","doi":"10.1109/icdcece53908.2022.9793218","DOIUrl":"https://doi.org/10.1109/icdcece53908.2022.9793218","url":null,"abstract":"E-wallet is a trending reviews have highlighted that there is a need to develop technology and is still new in most of the Asian countries. Past reviews have highlighted that there is a need to develop a digital wallet that allows the technology driven community to enhance their daily lives. Therefore, this research proposes the group e-wallet identified as iMight Application to allow users to have better control of their finance simultaneously providing an optimum user satisfaction. iMight application aims to promote sharing wallets via QuickPay as well as to monitor individual transactions. This application was developed using the Android Studio as the IDE and Java as the core programming language. It used the QR code and Fingerprint technologies to enhance the access authorization and security of the application. The findings suggest that the iMight application enhances the daily life of the users. Besides this, the proposed iMight prototype can be adapted real-time to optimize user satisfaction.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131206740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposed Quantitative Model for the Computation and Analysis of Waning Immunity for COVID-19 Virus among Human Population 人类对COVID-19病毒免疫力下降计算与分析的定量模型
S. S, R. P, Surbhi Choudhary
{"title":"A Proposed Quantitative Model for the Computation and Analysis of Waning Immunity for COVID-19 Virus among Human Population","authors":"S. S, R. P, Surbhi Choudhary","doi":"10.1109/icdcece53908.2022.9793024","DOIUrl":"https://doi.org/10.1109/icdcece53908.2022.9793024","url":null,"abstract":"Waning Immunity is an important and relevant concept during these days as the COVID-19 pandemic is expected to become endemic in the coming months. By definition, Waning Immunity is the loss of protective antibodies over time and hence necessitates booster shots at regular intervals of time. This quantitative study is on proposition of a model for computing a newly defined metric called Waning Immunity Index (WII). The model takes into account the three group of people namely, susceptible, infected and recovered individuals from the COVID-19 infections. The required data can be collected from the Kaggle repository that contains information on infections, recovery, vaccination and booster doses given on the human population while considering a geographical location. The proposed model and its implementation have thrown light on the spread, control and effect of COVID-19 virus. Results of the proposed model and the measurement can help health officials to seamlessly plan the duration of booster doses administered on vaccinated population. A sample data has been prepared for testing the model and the application of the proposed metrics. Based on the results, it is found that vulnerability of the Waning Immunity increases steeply at some duration and gradually steadies in time.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134025998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Rail Track Crack using CNN with Pre-Trained VGG16 Model 基于CNN预训练VGG16模型的轨道裂纹分类
Shreetha Bhat, A. Karegowda, Leena Rani A, V. S, D. G.
{"title":"Classification of Rail Track Crack using CNN with Pre-Trained VGG16 Model","authors":"Shreetha Bhat, A. Karegowda, Leena Rani A, V. S, D. G.","doi":"10.1109/icdcece53908.2022.9793318","DOIUrl":"https://doi.org/10.1109/icdcece53908.2022.9793318","url":null,"abstract":"One of the vital components of railway infrastructure is rail tracks. Maintenance of rail track has been a major challenge in most of the countries and one such challenge is the detection of cracks on the rail surface. To maintain good health of the tracks requires regular inspection and prompt action, failure to which, may lead to accidents and loss of lives. The railway department is introducing many innovative methods to make the inspection process efficient. In the past, various methods have been explored to detect defects on rail surfaces such as Computer Vision-Based method, but full automation is far from achievement. Few of the advanced countries are making use of Deep Learning techniques to monitor and maintain the condition of rail tracks. In, this paper, amalgamation of Convolutional Neural Network (CNN) and transfer learning is applied for classifying defective (with cracks) and non-defective rail surfaces.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132877312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of Five Level Multilevel Inverter with Reduced Leakage Current 减小漏电流的五电平多电平逆变器的实现
G. K
{"title":"Implementation of Five Level Multilevel Inverter with Reduced Leakage Current","authors":"G. K","doi":"10.1109/icdcece53908.2022.9793128","DOIUrl":"https://doi.org/10.1109/icdcece53908.2022.9793128","url":null,"abstract":"As nonrenewable fuels deplete; most of the businesses are transitioning to renewable energy. Solar energy is a abundant in nature and is a reliable source of renewable energy. In today's photovoltaic systems, multiple inverters are employed to convert DC power to AC power. Because of the low harmonics and low leakage current levels, multilevel inverters are more efficient than full-bridge inverters. In the presented work, various types of grid-connected multi-level inverters are simulated and results are compared. According to the simulation output, the value of leakage current is lowest in the case of a 5-level transformer less multilevel grid-tied inverter.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Diabetes using Multilayer Perceptron 基于多层感知器的糖尿病分类
Sivasankari S S, J. Surendiran, N. Yuvaraj, M. Ramkumar, C. Ravi, R. Vidhya
{"title":"Classification of Diabetes using Multilayer Perceptron","authors":"Sivasankari S S, J. Surendiran, N. Yuvaraj, M. Ramkumar, C. Ravi, R. Vidhya","doi":"10.1109/icdcece53908.2022.9793085","DOIUrl":"https://doi.org/10.1109/icdcece53908.2022.9793085","url":null,"abstract":"The breakthroughs in public healthcare infrastructure have resulted in a large influx of highly sensitive and critical healthcare information. The application of sophisticated data analysis techniques can aid in the early detection and prevention of a variety of fatal diseases. Diabetes can cause heart disease, renal disease, and nerve damage, all of which are life-threatening complications of the disease. The goal of this work is to identify, detect, and forecast the emergence of diabetes in its earliest stages by employing machine learning techniques and algorithms. When it comes to diabetes classification, an MLP is used. The experimental evaluation was carried out using the PIMA Indian Diabetes dataset. According to the study findings, MLP outperforms the competition in terms of accuracy, with an accuracy rate of 86.08%. Following this, a comparison of the suggested technique with the existing state of the art is carried out, proving the flexibility of the proposed approach to a wide range of public healthcare applications.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"328 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133661413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Modelling of Inverse Fractional-Order Band-pass and Band-stop Filters using Fractional-Elements 分数阶带通和带阻逆滤波器的分数元建模
Sumit Swain, Swaraj Sahoo, M. Tripathy, S. Behera
{"title":"Modelling of Inverse Fractional-Order Band-pass and Band-stop Filters using Fractional-Elements","authors":"Sumit Swain, Swaraj Sahoo, M. Tripathy, S. Behera","doi":"10.1109/icdcece53908.2022.9793241","DOIUrl":"https://doi.org/10.1109/icdcece53908.2022.9793241","url":null,"abstract":"This paper discusses the analysis of inverse fractional-order band-pass and band-stop filter in frequency domain. The control models of the proposed fractional-order filters are examined using fractional-capacitor and fractional-inductors bearing impedances ${z_c} = frac{1}{{{s^alpha }}}$ and z<inf>L</inf> = Ls<sup>β</sup> respectively with orders varying as 0.1<α<1.0 and 0.1<β1.0. The mathematical models of both the filters are obtained and the magnitude as well as the phase equations are derived. The design parameters are compared with its classical order counterpart and the dependencies of fractional-orders (α, β) are resulted with the center frequency, bandwidth, selectivity and roll-off-rates using MATLAB/Simulink. Here, a higher selectivity bandpass response is obtained using fractional-order inverse band-stop filter topology. Whereas, a higher bandwidth band-stop filter is realized using fractional-order inverse bandpass topology.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"19 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132126100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Offensive Security: Study on Penetration Testing Attacks, Methods, and their Types 进攻性安全:渗透测试攻击、方法和类型研究
Altynai Aibekova, Vinesha Selvarajah
{"title":"Offensive Security: Study on Penetration Testing Attacks, Methods, and their Types","authors":"Altynai Aibekova, Vinesha Selvarajah","doi":"10.1109/icdcece53908.2022.9792772","DOIUrl":"https://doi.org/10.1109/icdcece53908.2022.9792772","url":null,"abstract":"In the era of increasing growth of digitalization all information has become easily available through mobile and computer devices. This improvement has brought many useful and efficient technologies and services to peoples’ lives which are Web Application, Cloud Computing, Online Communication platforms, E-Commerce, and far more. While some users access this information with only good intentions, some use it to identify ways to destroy or steal valuable data, documents of a website, or in a physical building. As it is well known the term penetration testing is also named ethical hacking. Penetration testing is a set of procedures that emulates the actions of potential hackers but instead of taking advantage of the breaches found, penetration testers document them and present practical advice on how to fix identified weaknesses in the system. This study aims to discuss the types, the strategies of penetration testing, the code of conduct of penetration testers, the advantages, and the methodology in performing penetration testing. The method of penetration testing includes six stages that will be further discussed in detail. This paper illustrates a practical exercise in the example of the Five86-1 machine in a CTF format and that is built with the purpose of learning and gaining experience in conducting ethical hacking. All the attacks demonstrated in the paper are done in Kali Linux operating system. Further, the impact and critical analysis of the attacks is covered in the paper.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114932057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
5G Orchestration and Analysis: Dynamic Approach, Control and Challenges Faced 5G编排和分析:动态方法、控制和面临的挑战
H. S. Kamath
{"title":"5G Orchestration and Analysis: Dynamic Approach, Control and Challenges Faced","authors":"H. S. Kamath","doi":"10.1109/icdcece53908.2022.9792779","DOIUrl":"https://doi.org/10.1109/icdcece53908.2022.9792779","url":null,"abstract":"The fifth Generation (5G) approach is the future of network service and has untapped market in commercial and business hubs. It is planned to be used for broad set of scenarios and applications that involve IOT, automation and healthcare industries. Softwarization technologies, such as Software-Defined Networking (SDN) along with Network Function Virtualization (NFV), plays an important role in summation of these heterogenous technologies. The very concept of Network slicing proves as a low-cost solution for the usage of 5G requirements and software. The untapped concept of 5G radio access networks and basic networks will be suited on an SDN/NFV architecture, which will be capable to orchestrate and manage the resources and architecture control of the network in a way that the order is efficiently and very flexibly and with scalability provide network services. In this paper, we present the discussions based on the software-defined 5G radio access and basic networks and a broad range of future research challenges on the orchestration, control aspects, and the approach needed for the Virtual Network Function Placements and the comparison drawn with other algorithms.","PeriodicalId":417643,"journal":{"name":"2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114690569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信