{"title":"Investigation of WDM-MIMO Channel with DLF in Free Space Optical Communication","authors":"G. V, Prakash P, Kasthuri P, Pavithra P","doi":"10.1109/IC3IOT53935.2022.9767988","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767988","url":null,"abstract":"Free Space Optics (FSO) is a favourable channel used in optical communication system. WDM in Free Space Optical communication (FSOC) is implemented to overcome the signal degradation or loss of signal due to atmospheric turbulence like rain, fog, haze etc. Therefore, the capacity of the channel can be improved by WDM more efficiently. The WDM based FSOC system using Hybrid Optical Amplifier provides a solution to signal degradation in various atmospheric conditions. Multiple Input Multiple Output (MIMO) is used to mitigate the effect of turbulence for long distance communication with increased reliability. This paper mainly focuses to investigate the maximum link length in WDM-MIMO system with Delay Line Filter (DLF) using Optisystem simulation software and the link parameters such as Eye Pattern, Minimum BER and Maximum Q-factor are analysed.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133281971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Performance Optimization of Footstep Energy Harvester","authors":"D. S, A. R., H. R, Vimonisha A","doi":"10.1109/IC3IOT53935.2022.9767957","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767957","url":null,"abstract":"The energy demand and consumption are continuously increasing and in exponential steps. This requirement leads to high demand of generation of electricity by some other harmless and ecofriendly way. Thus, the recent research scenario seeks for availability of energy from any alternate sources. There are several proposals described by various researchers for generation of green and renewable energy. In this work, energy generation is proposed by effective conversion of waste energy extracted from the foot step movements and this method of energy generation is highly appreciated and followed in most of the countries and also in India. The places like railway station, temples, malls and etc., have more mobility of people and which are considered to be the important sources of foot energy. The best way to extract the foot energy is suggested using piezoelectric based technology, where floor sensors are used to sense the pressure exerted on a particular place and piezoelectric sensors are used to convert them into an electrical quantity. Appropriate DC-DC converter is then used for increasing the magnitude of power generated and suitable optimization technique is being suggested to improve the performance parameters of the generated power in order to enhance the quality of output. The boosted voltage is then stored and available as an energy source whenever required. The adaptability of piezo based technique in a real-time environment and its benefits are comparatively analyzed with other sources of renewable energy.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116645468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fuel level indicator using load cell through an audio feed output and location tracker for visually impaired","authors":"C. Aravindan, G. V. Kumar, R. Arthi, R. Abhilash","doi":"10.1109/IC3IOT53935.2022.9767892","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767892","url":null,"abstract":"Now a day's utilization of vehicles has been extensively increased everywhere around the world that each one of us own certain type of transportation facility. Even middle class /high class visually impaired people own vehicles equipped with drivers face common problems like unaware of the amount of fuel filled, distance travelled and unaware of places they are travelling. The proposed work suggests a solution to solve these problems by fixing a prototype in any vehicle and feeds the information in an audio form. Therefore, any Visually impaired person can keep track of all this information and these data can also be shared with some trusted person to take care of the visually impaired person's safety. The prototype uses the fuel level indicator using a load cell and the output is processed with the CPU and sent to an audio feed, GSM modem with GPS module and LCD display are used as the location tracker and display.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125152309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tamima Nisat, Md. Tabil Ahammed, Priyadharshini Balaji, Mohammad Hasibul Islam, Sanzida Akter, Md Al Amin Hossain, Al Rifat Hasan
{"title":"Big Data Analysis for E-Trading Flower Shop Management System","authors":"Tamima Nisat, Md. Tabil Ahammed, Priyadharshini Balaji, Mohammad Hasibul Islam, Sanzida Akter, Md Al Amin Hossain, Al Rifat Hasan","doi":"10.1109/IC3IOT53935.2022.9767906","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767906","url":null,"abstract":"Flower shops in Europe have traditionally been a billion-euro business. From a financial, market, customer and competitive standpoint, the study aims to investigate the business strategy in further detail. It provides evidence-based guidance on how to run a floral store. When it comes to running a flower store, they talk about the difficulties they've run into when trying to find the best floral suppliers. When it comes to impressing consumers, flower arrangements and services need to be on point at all times. There is no doubt that they will come back. That is to say, those with more disposable money frequently spend a greater amount to have a more unique shopping experience. The fragile economic climate may have a negative impact on sales, and the company must plan for this possibility. If a firm is successful, its business model will be copied by competitors as well. Even more crucially, the flower business must continually reinvent itself.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"16 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126106643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Despercredito - Smart Garbage System","authors":"G. Pooja, D. R, Shervena B, S. S.","doi":"10.1109/IC3IOT53935.2022.9767895","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767895","url":null,"abstract":"As there is exponential technological progress in present times, waste management is always a challenge despite technological development. Implementation of a clever bin with a credit-based system performs an inevitable position in this process. This paper proposes an idea of the efficient garbage system in two types of garbage bins, namely, stationary and autonomous garbage bins. The garbage bins are automated to move around along a pre-planned path and gather the garbage. The bins are automated to assemble near a dump area, from where the whole sum of garbage is collected. Additionally, the garbage level and status of each bin are updated on the web-server and Android application as an alert notification to enable remote monitoring, hence reducing human intervention. A camera is attached to the bin to detect the trash thrown away and make a sound to enhance the alert system. This paper also suggests an idea of computer vision and sensor-based waste segregation method in stationary garbage bins. Meanwhile, we have proposed a Wi-Fi card-based credit reward system to motivate and appreciate the environmentally friendly behavior of people, as recycling waste has become crucial to extending technological progress to the next level.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129249994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain Enabled Intelligent Digital Forensics System for Autonomous Connected Vehicles","authors":"Ranu Tyagi, Sachin Sharma, S. Mohan","doi":"10.1109/IC3IOT53935.2022.9767987","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767987","url":null,"abstract":"Autonomous connected vehicles are revolutionizing the automotive industry vision and impacting their business model. This trend will likely impact other related industries and their business model such as automotive insurance companies, tier-II automotive manufactures, and automotive maintenance service companies. The growing number of connected vehicles will require new policy formulation by the government about privacy and security issues in the era of massive digitalization and automation. Organizations such as 3GPP and IEEE are evolving standards that address security issues for connected vehicles. However, since Artificial Intelligence (AI) and Machine Learning (ML) will play a significant role in 5G networks and beyond, we address the privacy and security issues with a blockchain-based intelligent digital forensics system for autonomous connected vehicles (ACVs) in a connected smart world incorporating artificial intelligence. The proposed system includes a novel algorithm for the autonomous connected vehicles and the users' security and privacy. We utilize short randomizable signatures to anonymously authenticate witness's identities and to protect the witnesses' privacy. Then, we leverage fine-grained access control based on ciphertext-policy attribute-based encryption for evidence access and evaluate the feasibility of the proposed system by simulating the proposed model, its computational costs and communication overhead by implementing a prototype on a local Ethereum blockchain network platform. The simulation results show the proof-of-concept of the proposed system. We envision the application of the proposed system to ensure security and privacy of ACVs and their security applications for use with 5G-V2X and future XG-V2X networks.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Event Data Recorder And Transmitter For Vehicular Mishap Analysis Based On Sensordrone","authors":"C. A. Vinifred, A. Anand, Charankumar V, V. N.","doi":"10.1109/IC3IOT53935.2022.9767887","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767887","url":null,"abstract":"The future of the automobile industry and computing technology is eager to innovate and give exceptional safety features in their goods. as suggested The Event Data Recorder (EDR) is a preoccupied idea stop in vehicles that performs tasks similar to an airplane's black box. EVR investigates the causes of vehicle accidents and works to reduce the loss of life and property as a result of vehicle accidents. The system's goal isto accomplish accident analysis by objectively capturing what occurs in the car utilizing many sensors to capture the driving elements. In the case of an accident, data from all sensors is saved on the SD card for examination. In the case of an accident, there are additional emergency call alternatives to pre-stored cellphone numbers. SDG Goal 03 - Along with Health and Welfare, the proposed ideas are a step towards achieving sustainable India.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121473201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Ranjani, V.K.G. Kalaichelvi, Swathi Anbalagan, N. S, Murari Reddy Sudarsan
{"title":"A Deep study of Data science related problems, application and machine learning algorithms utilized in Data science","authors":"J. Ranjani, V.K.G. Kalaichelvi, Swathi Anbalagan, N. S, Murari Reddy Sudarsan","doi":"10.1109/IC3IOT53935.2022.9767897","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767897","url":null,"abstract":"Data Science study utilized for gathering information as data, taking out data from other systems, accumulating information, signifying and safeguarding data collected are used by organizations for marketing purposes and in high-tech implementations. Name of data science denotes a combination of databases and software engineering as well as a number of types of qualitative, quantitative entities and non-mathematical entities are furthermore necessary. Data science and its importance, components in data science included, life cycle of data science, Application of data science, various algorithms in machine learning are used with data science and implementation of machine learning algorithm in real life cases are also described. Finally, wound up with how to decode an obstacle in data Science using machine learning algorithms.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"64 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113961638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sridevi, R. Prabha, K. Reddy, K. Monica, G. Senthil, M. Razmah
{"title":"Network Intrusion Detection System using Supervised Learning based Voting Classifier","authors":"S. Sridevi, R. Prabha, K. Reddy, K. Monica, G. Senthil, M. Razmah","doi":"10.1109/IC3IOT53935.2022.9767903","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767903","url":null,"abstract":"As the internet has advanced nowadays, so has the frequent of internet-based attacks. Intrusion Detection (ID) is among the most widely used methods for identifying hostile activity in a network by examining its traffic. Machine-learning [ML] approaches are increasingly being used to solve all those situations where rationally comprehending the process of interest is difficult. A hugeamount of strategies on the basis of ML methodologies are being developed. In networked systems, intrusion detection is an issue in which, while it is not essential to interpret the measures obtained from a process, it is critical to acquire a response from a classification algorithm whether the network traffic is influenced by anomalies. To enhance network security, a strong Intrusion Detection System (IDS) is essential. In this paper, various ML algorithms have been implemented and compared for predicting whether there is intrusion in network data traffic or not.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Anjum, J. Raja, F. R. Rani, S. Sankavi, E. Oviya
{"title":"Parametric analysis of a small button shaped antenna camouflage with fabrics for body wearable applications","authors":"N. Anjum, J. Raja, F. R. Rani, S. Sankavi, E. Oviya","doi":"10.1109/IC3IOT53935.2022.9767924","DOIUrl":"https://doi.org/10.1109/IC3IOT53935.2022.9767924","url":null,"abstract":"Wearable antennas are transfiguring the consumer electronics because of their capability to work while being worn. Some of the notable examples include smart watches made of Bluetooth antennas, cameras often strapped by the user to capture footage etc. In this paper a wearable antenna is proposed, that has the shape of the button which can be worn on a cloth or fabric. A new antenna is designed by stacking dielectric resonator DR. The antenna has top and a bottom disc mounted on a cylindrical structure. The entire setup is then etched on the substrate with microstrip feed. The CPW is merged to achieve the desired frequency of Wi-Max and WLAN application. Thus, the designed antenna exhibited the desired resonant frequency applicable for Wi-Max application and can be used for WLAN as well. This antenna can be used along with the CMOS transceiver and can be integrated in medical, military and other wireless application.","PeriodicalId":430809,"journal":{"name":"2022 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132344311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}