{"title":"Cloud Driven Framework for Skin Cancer Detection using Deep CNN","authors":"Loveleen Gaur, Ujwal Bhatia, Sumedha Bakshi","doi":"10.1109/iciptm54933.2022.9754216","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754216","url":null,"abstract":"Cancer is a potent disease targeting millions of individuals every year. Of all its variants, skin cancer is the most common yet serious. Detection of skin cancer has proven to be a challenge due to the tricky nature of its symptoms. Skin cancer can be prevented and treated at a much early stage by checking the suspicious changes on the skin. Despite medical advancements, the patient's skin is examined mainly in manual ways, susceptible to diagnostic variations among several specialists, and low turnaround time. Added to this is the cost and time of finding a dedicated medical expert. This paper aims to investigate the tumour by applying Deep Convolution Neural Network (CNN) and propose a novel cloud-based service in synchronization with deep learning analysis to bridge the present gap between a patient and a cancer specialist.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"2005 1","pages":"460-464"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86908538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Clustering Hierarchy in Wireless Sensor Network using Dynamic Clustering Approach ILEACH-ACHH Protocol Compared with LEACH-ACHH Protocol","authors":"Nellore Naveen Reddy, S. C","doi":"10.1109/iciptm54933.2022.9753955","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753955","url":null,"abstract":"Aim: The main aim is to improve the energy efficiency of Wireless Sensor networks using the ILEACH-ACHH protocol and compared with LEACH-ACHH protocol. Materials and Methods: In this cluster-based dynamic routing the cluster heads are selected using multiple parameters such as Innovative node footprint, node threshold value, average energy, and distance. Sample data's ($n=39$) are collected by a varying number of rounds and it was calculated by calculator.Net with pre-test power of 80% (G-power). Result: The simulation results show that the ILEACH-ACH protocol achieved 12 % higher lifetime, 7.9 % higher throughput, 5.4 % higher packet delivery ratio, 4.2 % lower delay and 6.8 % lower energy consumption compared to LEACH-ACHH protocol. Independent sample t-test was performed which shows that it is statistically significant in terms of Lifetime, packet delivery ratio, delay, energy consumption and throughput ($p < 0.5$). Conclusion: From the independent statistical t-test and experiment's results the proposed Improved low energy adaptive clustering hierarchy-Advanced Clustering Hierarchy High (ILEACH-ACHH) protocol and performances are better when compared to the low energy adaptive clustering hierarchy-Advanced Clustering Hierarchy High (LEACH-ACHH) protocol.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"35 1","pages":"535-541"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90886628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rupasri, A. Lakhanpal, Soumalya Ghosh, Atharav Hedage, M. Bangare, K. V. D. S. Ketaraju
{"title":"Scalable and Adaptable End-To-End Collection and Analysis of Cloud Computing Security Data: Towards End-To-End Security in Cloud Computing Systems","authors":"M. Rupasri, A. Lakhanpal, Soumalya Ghosh, Atharav Hedage, M. Bangare, K. V. D. S. Ketaraju","doi":"10.1109/iciptm54933.2022.9753956","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753956","url":null,"abstract":"Cloud computing provides customers with enormous compute power and storage capacity, allowing them to deploy their computation and data-intensive applications without having to invest in infrastructure. Many firms use cloud computing as a means of relocating and maintaining resources outside of their enterprise, regardless of the cloud server's location. However, preserving the data in cloud leads to a number of issues related to data loss, accountability, security etc. Such fears become a great barrier to the adoption of the cloud services by users. Cloud computing offers a high scale storage facility for internet users with reference to the cost based on the usage of facilities provided. Privacy protection of a user's data is considered as a challenge as the internal operations offered by the service providers cannot be accessed by the users. Hence, it becomes necessary for monitoring the usage of the client's data in cloud. In this research, we suggest an effective cloud storage solution for accessing patient medical records across hospitals in different countries while maintaining data security and integrity. In the suggested system, multifactor authentication for user login to the cloud, homomorphic encryption for data storage with integrity verification, and integrity verification have all been implemented effectively. To illustrate the efficacy of the proposed strategy, an experimental investigation was conducted.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"48 1","pages":"8-14"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75643218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stability Index and Control Using PLL in Grid Connected Inverter System for Hybrid Renewable Energy System","authors":"Priya Sisodiya, A. Kori","doi":"10.1109/iciptm54933.2022.9754188","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754188","url":null,"abstract":"Power generation from Renewable energy sources is another solution for generation. But this Renewable energy generation systems contain many power electronic devices, which arises the power stability issues in the overall systems. Here, Hybrid renewable energy system (solar and wind) is used to generate electricity. This paper deals with the effect of grid connected voltage source inverter system using phase locked loop (PLL) and Proportional Integral controllers and stability index with nonlinear loads. For grid connected systems, a comparison is done with the proportional integral controllers and dq0 to abc transformation is used and then phase locked loop is used for control of inverter and Pulse width modulation is used to produce the gate pulse for the inverter system with the help of the MATLAB Simulink Model.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"49 1","pages":"483-487"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83594942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Srajan Agarwal, Koya Rohith Reddy, Y. Chauhan, H. U.
{"title":"Ingenious AI Visual Identification","authors":"Srajan Agarwal, Koya Rohith Reddy, Y. Chauhan, H. U.","doi":"10.1109/iciptm54933.2022.9754143","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754143","url":null,"abstract":"In our software Ingenious AI Visual Identification using facial recognition we're primarily focused on stating the remaining platform for attendance, in which a person can first provide their required non-public information and be enrolled for automatic attendance via our software. As a result, we want to make this system software well-suited for any organization on the route to replacing the old and out-of-date attendance-taking system with our new output. We're essentially that specialize in citing the remaining platform for attendance wherein a man or woman can to begin with feed their required non-public facts and get them enrolled for the Automatic Attendance via our Software. There through we have the desire to make this software program well matched for each and every Organization on the way to update the vintage and outdated attendance taking process with our new output.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"20 1","pages":"259-263"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81665341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Region based Detection of Ships from Remote Sensing Satellite Imagery using Deep Learning","authors":"Chukka Anusha, Chandra R. Rupa, G. Samhitha","doi":"10.1109/iciptm54933.2022.9754168","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754168","url":null,"abstract":"Ship detection in satellite imagery is an important application in marine time security. This can also be majorly used in sea pollution control, oil leakage detection and other illegal fisheries. A deep learning approach can be used to detect the ships from satellite imagery. For this, pre-processing using image segmentation is done followed by the bounding box detection from YOLOv3. This is done on a Kaggle ship dataset with 231722 images. After passing the training set to the model, the model can detect the region of ship followed by count of ships in the given image. This can be tested with other deep learning approaches to increase the detection accuracy. Furthermore, the detection region and the count of ships can be passed to a hash function which in turn increases the security of the model.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"20 1","pages":"118-122"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87337566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Clustering routing Protocol in Sensor Networks: A Study","authors":"Poonam Tiwari, Sandeep K. Gupta, A. Pathak","doi":"10.1109/iciptm54933.2022.9753905","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753905","url":null,"abstract":"Sensor network becomes most emerging technology in these days and it plays a important role in every field. WSN also becomes important topic in nowadays because this technology is used in very sensitive areas like Education, Military Services, Medical field, Surveillance, Agriculture monitoring, Industrial Monitoring, etc. Sensor networks is interconnected distributed network consist of relatively simple, low-cost, low-power sensor nodes. Energy conservation is biggest challenge in wireless sensor network because after deployment of these tiny sensor nodes it is not possible to recharge them. There is lots of energy saving schemes that are used to decrease the power consumed and to increase the life of network life. Clustering is most prevalent technology which is able to make sensor networks energy-efficient. The scheme aims to minimize the communication distance of sensors. In this article, a survey on different energy based Clustering routing protocols has been done.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"238 1","pages":"333-338"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72911372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sandeep Singh, S. B. Bajaj, K. Tripathi, Nagendra Aneja
{"title":"An Inspection of MANET'S Scenario using AODV, DSDV and DSR Routing Protocols","authors":"Sandeep Singh, S. B. Bajaj, K. Tripathi, Nagendra Aneja","doi":"10.1109/iciptm54933.2022.9753951","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753951","url":null,"abstract":"In this paper the Mobile Ad Hoc Network (MANET) was considered for analyzing the performance of Destination Sequenced Distance Vector (DSDV) of Proactive class and Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing Protocol (DSR) of Reactive class. The protocols were simulated using the NS-2 (Network Simulator 2.35) package on Linux 12.04. The paper focuses on performance parameters e.g. Packet size, Speed, Packet rate, Transmission Control Protocol (TCP) types and Number of Packets and energy in the network. Simulation results shows that DSR gives better performance as compared to AODV and DSDV. The results were compared for inspection of packet delivery rate, % Lost packets, throughput and Jitter on varying Packet size, TCP types, and the number of packets in queue by changing packet size. The implementation study can further extend by applying artificial algorithms in MANET for enhancing the better results in presence of any type of attacks too.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"103 1","pages":"707-712"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73344357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Post Graduate Engineering Education from Home for Optical Networking Laboratory during COVID19 Second Wave in India","authors":"S. Khant, Atul Patel, P. Prajapati","doi":"10.1109/iciptm54933.2022.9754192","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754192","url":null,"abstract":"Effective Teaching learning process must be very difficult in this COVID19 era for engineering teachers where they need support of hardware to explain certain fundamental things. Optical networking is one subject where it is difficult to explain certain results without experimental analysis. This paper describes basic optical networking experiments like Wavelength Division Multiplexing types of Passive Optical Network (WDM-PON), Time Division Multiplexing types of Passive Optical Network (TDM-PON), Fiber to the Home Network (FTTH), Wireless passive Optical Network using free space optics (FSO) techniques. Optsim 5.0 software is used to simulate the applications.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"123 1","pages":"188-193"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73946221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Bandwidth Enhancement of Parasitic Patch Antenna and Comparison with U-Slot Microstrip Patch Antenna for GPS Applications","authors":"K. V. Pavan, J. F. Roseline","doi":"10.1109/iciptm54933.2022.9754082","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754082","url":null,"abstract":"Aim: The purpose of this research work is to design an innovative parasitic antenna for bandwidth enhancement and comparison with U-Slot microstrip patch antenna for GPS applications. Materials and Methods: The antenna was designed in the open source HFSS software. Two sample groups each of sample size ten were collected for both the antennas. Group 1 is taken as a proposed antenna innovative parasitic antenna and group 2 is taken as U - slot microstrip patch antenna. Both the antennas were designed at an operating frequency of 7 - 8 GHz. For bandwidth enhancement of an antenna, return loss was considered as a key factor in order to obtain the better bandwidth. Results: Antenna was designed in the HFSS software and after designing by giving far fields output graphs were displayed. The return loss obtained for innovative parasitic antennas was −31.3897 dB which have more bandwidth and return loss of 0.4682 dB for U - slot antenna which has very less bandwidth. The significance value obtained in SPSS was 0.0173 ($P < 0.05$) Conclusion: The innovative parasitic antenna provides more return loss and bandwidth at 8.1 GHz when compared to U-slot antenna for GPS applications.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"28 1","pages":"600-605"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84902020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}