B. Obulesu, K. V. Raju, P. S. Sumanth, A. Vamsi, C. Kiran
{"title":"Design and Implementation of Crosstalk Noise Avoidance by using Advanced Test Adapted Shielding for high speed vlsi circuits","authors":"B. Obulesu, K. V. Raju, P. S. Sumanth, A. Vamsi, C. Kiran","doi":"10.1109/ESCI56872.2023.10100085","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10100085","url":null,"abstract":"The Crosstalk noise is existing in VLSI circuits because of the electromagnetic coupling in between the wires unfriendly, it affects the VLSI circuits accurate performance. This makes interconnect testing a vital issue in responsibility analysis that causes additional space and hardware operating overhead[2]. In this project, we have a tendency to gift a completely unique methodology that we have a tendency to talk over with advanced Test Adaptive Shielding (TAS), so as to boost testing challenges and in addition to optimize crosstalk noise. Boosting of circuit performance is done by test structure at Test adapted shielding which includes the insertion of modified shield lines. The Hardware which is being developed for test data is sensible to ignore the aggregation faced by victim lines due to crosstalk noise. The main methodology of TAS method is to reduce he over use of power, complex nature, fault detection. The projected technique will implement in ASIC, VERILOG HDL.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114322972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Self- Regulated Robotic Illuminant Using NodeMcu(ESP8266)","authors":"Vijay Gaikwad, Manasi Doiphode, Mandar Gatke, Gaurav Moona, Chinmay Gavit, Pranjal Ghuge","doi":"10.1109/ESCI56872.2023.10099620","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10099620","url":null,"abstract":"Energy consumption in today's world is increasing at a high rate, in making life easy and nights safe street light are used which uses a large amount of electricity. If the lighting system is less efficient in power consumption this leads to excessive use of the energy which can be saved with proper management of the street light system. In this project a system is suggested to make the street light system more efficient and which is focused on reducing power consumption as much as possible. This uses different IoT devices and technologies to make the system responsive to the needs and save power to reduce exploitation of energy.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130191637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud based Single Shot Detector Model for Speed Breaker Detection","authors":"Shital Pawar, Siddharth Nahar, Mohd. Daanish Shaikh, Vishwesh Meher, Sanskruti Narwane","doi":"10.1109/ESCI56872.2023.10099534","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10099534","url":null,"abstract":"Speed breaker-related accidents are on the rise. Irregular use of speed breakers at odd positions contributes to accidents. To tackle this problem a cloud-based speed breaker detection system has been developed. It is a deep learning-based approach. Single Shot Detector (SSD) for MobileNetV2 architecture is used for detection. Detection metrics based on the Common Objects in Context (COCO) dataset were utilized for performance evaluation. The model achieved a mean average precision of 97.19 % at 50% intersection of union. This showcases the ability of the model to detect speed breakers on the road correctly. The model is hosted on the Microsoft Azure cloud platform which processes images from the ESP32 Wi-Fi Cam Module. An application that continuously interacts with the cloud-based deep learning model is also developed. It displays an alert if the cloud-based model detects a speed breaker","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122320315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rapid Detection of Pilgrims Whereabouts During Hajj and Umrah by Wireless Communication Framework : An application AI and Deep Learning","authors":"Mohammed Alhameed, Mohammad Alamgir Hossain","doi":"10.1109/ESCI56872.2023.10099969","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10099969","url":null,"abstract":"Human injuries and deaths occur often during public events like concerts, religious services, and political rallies because of a lack of proper crowd safety oversight. A small disaster can trigger panic in a huge crowd. Many intelligent video surveillance solutions can identify things, but despite the recent developments in artificial intelligence approaches and deep learning processes, it is very probable to track congested crowds and their mobility to avoid future detection disasters. Searching for points of interest makes use of movement analytics and classification to provide a superior platform for monitoring large crowds. The purpose of point-of-interest explorations is to aid in the management of the safety of moveable crowd events by assisting in the prediction and prevention of future disasters through the classification and analysis of real-time information gathered from crowds. Current surveillance cameras are insufficient for monitoring large crowds in outdoor locations due to their inability to scale. We believe that by using our proposed crowd analysis strategy, we may help enhance the current state of crowd safety management. Among the many aspects of crowd motion, we pay special attention to the difficulties of determining the identity, velocity, and direction of individuals inside the group. We then used these crowd-level semantics to monitor test POI searches in both a controlled lab environment and a real-world crowd. Findings from this study imply that POI searching can be utilized to help prevent harmful circumstances brought on by the movement of large crowds by recognizing the characteristics of mobile crowds in real time.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116473469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Learning Aided Intelligent Mechanism for Channel Estimation in 5G Wireless Networks","authors":"Sakhshra Monga, A. Taneja, N. Saluja, R. Garg","doi":"10.1109/ESCI56872.2023.10100184","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10100184","url":null,"abstract":"The attenuation of signals due to propagation environment is the major challenge of wireless communication which results in frequent call drops, reduced signal strength and low transmission rates. The propagation channel often degrades the signal quality at the receiver due to channel effects including fading, shadowing, path loss and other overhead. The propagation channel and its successful estimation is very important for ensuring communication reliability in next generation wireless systems. This paper presents an intelligent mechanism based on deep learning to estimate the wireless channel such that the system spectral efficiency is enhanced. The impact of signal distortion due to hardware effects is also considered. Further, the proposed scheme is compared with the conventional LMMSE channel estimation scheme. Also, to extract the data using the estimated channel, the performance of proposed scheme is evaluated using three receivers namely, RZF, MMSE and modified MMSE. It is observed that the proposed scheme outperforms the LMMSE scheme in terms of normalised mean square error (NMSE) by 14.43% and by 27.16% in the absence of distortion. In the end, the performance comparison with the system with known perfect channel state information (CSI) is also performed.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126788813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hand Landmark Distance Based Sign Language Recognition using MediaPipe","authors":"P. K, Sandesh B.J","doi":"10.1109/ESCI56872.2023.10100061","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10100061","url":null,"abstract":"The deaf and hard-of-hearing community uses sign language for communication and interaction with the external world. Sign language recognition has been an active area of research for many years, and there has been progress in both sensor-based and vision-based methods. Sensor-based methods, such as those that use gloves or other wearable devices, have historically been more accurate, but vision-based methods are becoming more prevalent due to their cost-effectiveness. The study aimed to recognize sign language words using hand pictures captured by a web camera. The mediapipe hands method was used to estimate hand landmarks, and features were generated from the distances between the landmarks. Support Vector Machine (SVM) classifiers were used for character and words classification. The study used its own dataset and it compared different scaling factors, including the distances from positions 0 to 17, 5 to 17, and 0 to 12, to determine which one worked best. The best results were found using the palm size distance (o–9). The proposed approach is economically feasible and computationally simple, requiring no specialized equipment.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116789276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Transaction Anomaly Detection Model for Credit Card Usage Using Machine Learning Classifiers","authors":"B. B. Jayasingh, G. B. Sri","doi":"10.1109/ESCI56872.2023.10100152","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10100152","url":null,"abstract":"The methods for payment of an online transaction are credit or debit card, online bank transfer, e-wallets, mobile payments, etc. The process of electronic fund transfer is secure, and password protected, as claimed by the vendors. The security threats for all payment methods exist with an intention, like credit and debit card frauds. Monitoring fraudulent activities becomes more important as the number of online transactions for credit card usage grows over time. The detection of deviations from the large number of transactions in cases of frauds in credit card is desired using the classifiers of machine learning. We proposed to develop a Transaction Anomaly Detection (TAD) model for online transactions during credit card usage by customers using machine learning. The model is built to exploit and expose fraudulent transactions during online transactions at e-commerce sites. This work considers a data set from kaagle.com that has 28,4807 records of credit card transactions online with a class label. The proposed TAD model applies various machine learning algorithms to calculate the performance metrics and finds an efficient algorithm for detecting online transaction anomalies with good accuracy and recall. We observed that the XGB Classifier classifies the fraudulent transactions with an accuracy of 99.96% and a recall of 83%, which is the best suitable algorithm for this dataset.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132554122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Based Problem Solving Approach in Green Computing","authors":"S. Bakre, A. Shiralkar, S. Shelar, Suchita Ingle","doi":"10.1109/ESCI56872.2023.10099977","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10099977","url":null,"abstract":"The issues related to conventional generation of electricity arethe matter of concern for power sector today. These include diminishing stock of coal over a period of time, unavailability of good quality coal, non-sustainable issues, ash handling problems etc. Green energy is the alternative to overcome these problems. The green energy is sustainable, renewable and economical. In India, the existing ratio of conventional to non-conventional generation as on 30th June 2022 is 72:28%. It is required to further improve this ratio to the tune of 60:40%. The performance of the green energy systems can be optimized by AI ML based green computing. Under the umbrella of AI, several technologies have been emerged. These technologies are machine learning, deep learning, data analytics, robotics, neural networks, expert systems, fuzzy logic systems, natural language processing, genetic algorithms etc. The green computing can be made more effective through research as regards how to use these technologies. In this paper, a novice techniques of AI ML based green computing have been proposed. Python programming language is used as a back end programming tool. The proposed methods are simple, cost effective and feasible.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132825793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain Security Implementation using Python with NB-IoT deployment in Food Supply Chain","authors":"Chand Pasha Mohammed, Shakti Raj Chopra","doi":"10.1109/ESCI56872.2023.10100139","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10100139","url":null,"abstract":"Both academia and Industrialists are paying keen attention to the Narrow Band Internet of Things (NB-IoT) developments in the modern era. While the Narrow Band Internet of Things is gradually being adapted for commercial purposes, it continues to raise a slew of security concerns, including those around authentication and privacy. Because blockchain technology incorporates a framework for maintaining confidence, auditing, and openness, it can be a promising tool for ensuring the Network's data exchange is secure. To enhance the level of security afforded narrowband data and to maintain their accuracy and transparency. We leverage the advantages of blockchain technology with Narrow Band Internet of Things (NB-IoT) with Food supply chain management. The system identifies the damaged agricultural product during the transportation between the Manufacturer to the Retailer and executes the python program to find the damaged product during the transportation that is used to authenticate data and generate the blockchain our scheme is deemed to possess attractive confidentiality, authentication, accountability, and quality characteristics, rendering it an ideal method for secure transportation with traceability future added in all-time possible in a decentralized and distributed manner using sha-256 secure algorithm in blockchain technology and narrowband internet of things.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133407745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yash Gajanan Pame, V. G. Kottawar, Yogeshwari V Mahajan
{"title":"A Novel Approach to Maze Solving Algorithm","authors":"Yash Gajanan Pame, V. G. Kottawar, Yogeshwari V Mahajan","doi":"10.1109/ESCI56872.2023.10099728","DOIUrl":"https://doi.org/10.1109/ESCI56872.2023.10099728","url":null,"abstract":"This research aims to address the maze discovery issue of an autonomous micro-mouse bot in an unknown maze. In this paper, An algorithm is proposed to search for unknown mazes and find the shortest path. The maze considered here is built according to the IEEE standards. To map the maze, we use a 2-Dimensional matrix to mark the visited and unvisited squares of the maze and a 2-Dimensional list is used to store the path travelled by the bot and a variable is defined which stores the current location of the bot with respect to the maze and the matrix. Our task is to discover the maze and then find the shortest distance to reach the target square in the maze. Every movement of the micro-mouse is stored in a list and this list is converted to a graph-like structure on which we apply a variant of the Breadth-first Search Algorithm to get the shortest path. But the proposed algorithm is also flexible to use other algorithms such as Depth-first search or A*. This paper presents an easy approach to the IEEE standard robot maze-solving algorithm.","PeriodicalId":441215,"journal":{"name":"2023 International Conference on Emerging Smart Computing and Informatics (ESCI)","volume":"23 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114013799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}