0% found this document useful (0 votes)
1K views357 pages

ICCET 2022 - Proceedings Release v1

Uploaded by

arul85700
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views357 pages

ICCET 2022 - Proceedings Release v1

Uploaded by

arul85700
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

10th INTERNATIONAL CONFERENCE ON

“CONTEMPORARY ENGINEERING AND TECHNOLOGY –


2022”

(ICCET – 2022)

May 21st – 22nd, 2022

ORGANIZED BY

ORGANIZATION OF SCIENCE AND INNOVATIVE


ENGINEERING & TECHNOLOGY (OSIET).

Chennai, India.

Website: www.ijsiet.org

In association with

PRINCE SHRI VENKATESHWARA PADMAVATHY


ENGINEERING COLLEGE

PRINCE DR. K. VASUDEVAN COLLEGE OF ENGINEERING


AND TECHNOLOGY

Medavakkam - Mambakkam Road, Ponmar, Chennai – 600 127

Website: www.psvpec.in
www.princedrkvasudevan.com
ICCET 2022

Proceeding of International Conference on Contemporary Engineering and


Technology.

21st & 22nd May, 2022

Organized by:

Organization of Science and Innovation Engineering & Technology

4/3, Vallalar Street, Choolaimedu, Chennai – 600094

Venue:
Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and
Technology Medavakkam - Mambakkam Road, Ponmar,
Chennai – 600 127

ISBN 978-93-81288-22-1

Published by:

Sabanayagam Publications, Chennai.


Design & Printed by :
United Bind Graphics, Chennai.
[email protected], 9282102533
CHAIRMAN’S MESSAGE

I am delighted to welcome you all to the International Conference on “Contemporary


Engineering and Technology” (ICCET 2022) which brings together experts and
academics from around the world. The conference this year has brought together a
tremendous and rich diversity of authors and speakers from universities, government
and industry to share ideas and new perspectives on a wide range of
Communications, Electronics, Networking, Computer Science, Mechanical and
Electricals research and technologies. Addressing the new technical and business
issues are essential to advance in today's engineering and technological
environments. In order to provide an outstanding technical level for the presentations
at the conference, we have invited more than 15 distinguished experts in the
Engineering and Technology field to participate in the Advisory Committee.
Academic excellence has always been the hall mark of our institute and we are
committed to provide a comprehensive education which seeks to develop the
students into academically proficient, morally upright and socially well integrated
individuals. I would like to express my thanks to all authors for their outstanding
contributions and in particular the members of the program board for their competent
evaluation of the large number of submissions

We are very pleased with the quality, depth, and breadth of this year's
technical program. I wish you a most enjoyable experience at the Conference.

Dr.K.Vasudevan

Chairman
Prince Group of Educational Institutions
VICE CHAIRMAN’S MESSAGE

The words “Engineering” and “Technology” are not just words but are vital
disciplines that guide the world by bringing huge changes to the current way of
living. Modern Engineering and Technological innovations are making people
think that nothing is impossible in this world. Everything can be achieved with an
extremely powerful vision and a path to attain that vision. If a person is doing a
marvel, keep in mind that you too can outshine them with perseverance. Dr. A. P.
J Abdul Kalam said “Dream is not something that comes when you sleep, it is
something that doesn’t let you sleep”, so, dream a lot about how to bring changes
and try to make the changes come true. Remember earning money is not life; it is
just a part of life which can be easily earned when you do it with dedication.
Science and technology have become so closely intertwined, and I hope the
conference will help you to reinforce each other.

th
We are very much elated in welcoming you all to our college for the 10
International Conference on Contemporary Engineering and Technology and I wish
the students all the very best for their presentations.

Dr. V.Vishnu Karthick,

Vice Chairman,

Prince Shri Venkateshwara Padmavathy Engineering College.


ADMINISTRATIVE OFFICER’S MESSAGE

The world is growing fast in fact it grows in such a way that a thing invented
yesterday becomes obsolete today, which means there is a plethora of competition
in each and every discipline of engineering and technology. This scenario goes well
with a famous quote of a philosopher Heraclitus, who said, “Change is the only
constant in this world.” Now a days people need new inventions for their daily works
so that they can do it with ease. People not only need to do their activities with ease
but they also need it to be done within a period of time. As an engineer we need to
solve problems that are left unsolved. As a way of showcasing
th
the talents of young minds to find solutions we have organised this 10
International Conference on Contemporary Engineering and Technology.

I welcome you all to this event, my warm wishes to the students who are going to
present their papers and also hearty thanks for the staff who have made this event a
great success.

Er. K. Parthasarathy

Administrative Officer

Prince Group of Educational Institutions


PRINCIPAL’S MESSAGE

I express my happiness to meet you through this 10th International Conference on Contemporary
Engineering and Technology (ICCET 2022). I am much delighted to convey my warm greetings to
the Guests and the Host. We, at Prince Shri Venkateshwara Padmavathy Engineering College and
Prince Dr. K. Vasudevan College of Engineering and Technology, Ponmar, Chennai impart futuristic
technical education and instil high pattern of discipline. Education is sweeter and valuable when it
promotes the blossoming of natural talent that enriches students to be self reliant individuals. The
scenario of technical education in India is now in a transformational phase as compared to earlier
times. We are in a compelling era where global conditions require conventional practices which
make one to change and adapt to suit the present requirements and also address futuristic needs. The
college is committed in enhancing the quality of service delivery, providing practical cum industrial-
oriented programs and ensuring a valuable campus environment for the faculty and students. With
the support of the Management, faculty members, staff and students are excelling in their work. The
holistic and comprehensive education provided in the College will enlighten the students and enable
them to face the challenging world. Research is the key parameter to promote the individuality to
horizon. In order to create the best engineers we have organized the international conference to
enhance the research activities of the budding engineers.
This proceeding of the conference has been documented with utmost care. I believe strongly that,
this will stand as a great source of knowledge and researchers. With immense pleasure and pride, I
welcome all the participants and convey my best wishes for ICCET 2022.

Dr. G Indira
Principal
Prince Shri Venkateshwara Padmavathy Engineering College
PRINCIPAL’S MESSAGE

th
I am indeed most delighted to chair this 10 International Conference on
Contemporary Engineering and Technology (ICCET 2022). The sharp, clear sighted
vision and precise decision making powers of our management has benefited our
college to stay competitive. The Pedagogy at the Institute is Modern where a variety
of learning, behavioural tools are used in quality pursuance of knowledge,
development of skills, attitudes, and values complemented by academia-industry
interface imparting uniqueness to our programme. The Institute focuses on the holistic
development of its students through variety of methodologies and extracurricular
activities the whole year round. Today, we live in an era of incredibly rapid
technological change. Technology has dominated our lives and we now have the ever
evolving technology at our finger tips. Symposium, Seminars and International
Conferences and Workshops are organized in the institute for their overall
development. Teaching and Research are the two primary activities through which we
fulfil our Mission and Objective. The Institute takes pride in welcoming
th the National and
International participants for 10 International Conference.

With a firm foundation of the past and high hopes for a bright future, I wish everyone
good luck and prosperity ahead. May we grow many technological wings!

Dr. T.Sunder Selwyn


Principal
Prince Dr. K. Vasudevan College of Engineering and Technology.
ABOUT INSTITUTION
Prince Educational Society was established in 1978 by our Founder - Chairman Dr. K. Vasudevan, M.A.,
B.Ed., Ph.D. Going down memory lane in the seventies, our Chairman had realized the need for an
Institution which will serve as a role model and stand apart from other Educational Institutions.

VISION

The main aim of Prince Shri Venkateshwara Padmavathy Engineering College & Prince Dr. K. Vasudevan
College of Engineering & Technology is to meet the challenges and demand of the highly advanced scientific
and technological fields and to prepare to meet the man power needs of the world.

MISSION

To provide goal-oriented, quality-based and value-added education through state-of-the-art technology on


a par with international standards. To promote nation - building activities in science, technology, humanities
and management through research.To create and sustain a community of learning that sticks on to social,
ethical, ecological, cultural and economic.

OUR GROUP OF INSTITUTIONS

Prince Shri Venkateshwara Padmavathy Engineering College

Prince Dr. K. Vasudevan College of Engineering & Technology


Prince Shri Venkateshwara Arts and Science College

Prince Matriculation Higher Secondary School,7,Kannagi Street, Madipakkam to Puzhuthivakkam, Chennai 091

Prince Sri Vari Vidyalaya CBSE School,93 ,College Road , Nanganallur, Chennai 114.

Prince Sri Vari Vidyalaya CBSE School, 12,Kannagi Street, Madipakkam to Puzhuthivakkam, Chennai 91 Shri

Venkateshwara Higher Secondary School, 9,Kannagi Street, Madipakkam to Puzhuthivakkam, Chennai 91

Prince Matriculation Higher Secondary School, 67&68, College Road, Nanganallur , Chennai 114.

ICCET 2022
PATRON-IN-CHIEF

Thiru. Dr. K. Vasudevan, M.A., B.Ed., Ph.D,


Chairman,Prince Group of Educational Institutions.

Thiru. Dr.V.VishnuKarthik, MD, Vice-Chairman, Prince Group


of Educational Institutions.
SECRETARY

Er.K.Parthasarathy, B.E,

Administrative Officer, Prince Group of Educational Institutions.

CONFERENCE CHAIR

Dr. V.Mahalakshmi, Principal,


Prince Shri Venkateshwara Padmavathy Engineering College

Dr.Sunder Selwyn, Principal,


Prince Dr.K.Vasudevan College of Engineering

SPEAKERS
Dr. K. Aldrin Karunaharan, Assistant Professor, International Maritime College
Oman, Sohar, Oman

Dr. Vaithyasubramanian.S, Assistant Professor, PG and Research Department of


Mathematics, Dwaraka Doss Goverdhan Doss Vaishnav College, Chennai,
Tamil Nadu

Dr. Sivakumar Krishnan, Professor & Dean and Former Principal, Rathinam
Technical Campus, Coimbatore, Tamil Nadu

CONFERENCE SESSION CHAIR

Dr. S. Vijayakumar, IEEE Vice Chairman, PSES – Madras Chapter

Dr. Sivakumar Krishnan, Professor & Dean and Former Principal, Rathinam
Technical Campus, Coimbatore, Tamil Nadu
Dr. M.Jeyakarthic, Assistant Director, Tamil Virtual Academy, Anna
University, Chennai, Tamil Nadu

Dr. Vaithyasubramanian.S, Assistant Professor, PG and Research Department of


Mathematics, Dwaraka Doss Goverdhan Doss Vaishnav College, Chennai,
Tamil Nadu

Dr. G. N. R. PRASAD, Associate Professor, MCA department, Chaitanya


Bharathi Institute of Technology, Gandipet, Telangana

Dr. T Jayakumar, Assistant Professor, Department of Mechanical, AMET


University, Chennai, Tamil Nadu

Dr. H.S.Niranjana Murthy, Associate Professor, Electronics & Instrumentation,


Ramaiah Institute of Technology, Bangalore, Karnataka

Dr. Harshavardhan Awari, Senior Assistant Professor, Computer Science,


VNRVJIET, Hyderabad, Telangana

Dr. K. Sudhakar, Associate Professor, Computer Science and Engineering,


PSCMR College of Engineering & Technology, Vijayawada, AP
Dr. Velappagari Sekhar, Associate Professor & HOD, Kuppam Engineering
College, Kuppam, AP

Dr. C Sakthi Gokul Rajan, Assistant Professor (Senior), Kuppam Engineering


College, Kuppam, AP

Dr. G Rajesh, Teaching and Research Assistant, SENSE, VIT university,


Vellore, TN

Dr. C Kavitha, Associate Professor, Electronics and Communication


Engineering, SITAMS Autonomous, Chittoor, AP

Dr. Raviprakash ML, Associate Professor, Department of CSE, Kalpataru


Institute of Technology, Tiptur, Karnataka
Dr. Ananda Babu J, Associate Professor, Department of Information Science and
Engineering, Malnad College of Engineering, Hassan, Karnataka

Dr N Vinodhkumar, Associate Professor, Electronics and Communication


Engineering, Vel Tech Rangarajan, Dr Sagunthala R and D Institute of Science and
Technology, Chennai, Tamil Nadu
INDEX
S.NO PAPER ID PAPER TITLE

1 ICCET22002 UWB MICROSTRIP PATCH ANTENNA FOR WIRELESS SENSOR APPLICATIONS


MULTILAYER PERCEPTRON ANALYZED THE AUDIENCE PERCEPTION TOWARDS CITIZENSHIP
2 ICCET22004 AMENDMENT ACT-CAA (INDIA)
REVIEW OF RESEARCH ON AERODYNAMIC CHARACTERISTICS OF SUPERCRITICAL AIRFOIL 2414 SERIES ON
3 ICCET22001 TRANSONIC FLIGHT
TEXTILE HORIZONTAL T-SHAPED ULTRAWIDE BAND MICROSTRIP PATCH ANTENNA FOR WIRELESS BODY
4 ICCET22010 AREA NETWORK APPLICATIONS

5 ICCET22007 INCOMPLETE FUZZY SOFT SETS IN SANCHEZ'S METHOD OF DECISION MAKING

6 ICCET22008 ON SOLVING FUZZY TRANSPORTATION PROBLEM USING FUZZY ONE-POINT METHOD

7 ICCET22006 CRIME DATA FORECASTING USING MACHINE LEARNING AND BIG DATA ANALYTICS

8 ICCET22012 APPLICATION OF QUEUEING THEORY FOR THE IMPROVEMENT OF RAILWAY SERVICES

9 ICCET22011 APPLICATIONS OF GENERALIZED FUZZY SOFT SETS IN DECISION MAKING PROBLEM


DESIGN OF NOVEL T-FLIP FLOP FOR SYNCHRONOUS COUNTER USING QUANTUM-DOT CELLULAR
10 ICCET22020 AUTOMATA
INFLUENCE OF MANAGER’S SUPPORT IN CAREER PLANNING AND DEVELOPMENT ON CREATING
11 ICCET22028 EMPLOYEES’ POSITIVE ATTITUDE TOWARDS ORGANIZATION.

12 ICCET22035 AN APPLICATION SPECIFIC WEB-BASED DATABASE FOR INSTITUTIONAL DATA MANAGEMENT SYSTEM

13 ICCET22037 RANKING OF PARABOLIC TRAPEZOIDAL FUZZY NUMBER USING THE CENTROIDS AND FOCUS

14 ICCET22036 INSERTION OF TIE –BREAKING MECHANISM FOR FLOW SHOP SCHEDULING PROBLEM

15 ICCET22027 IOT BASED SOLDIERS MONITORING AND TRACKING IN THE WAR-FIELD


16 ICCET22032 ANN BASED IMAGE SEGMENTATION FOR PHOTOVOLTAIC HOT-SPOT DETECTION

17 ICCET22047 A DISTINCTIVE APPROACH FOR EARLY DETECTION OF PLANT DISEASE FOR SUSTAINABLE AGRICULTURE
A NEW MODEL BASED DESIGN AND PERFORMANCE ANALYSIS OF HIGH THROUGHPUT AND LOW
18 ICCET22039 LATENCY DA-FIR FILTER FOR EFFECTIVE NOISE REMOVAL IN SDR APPLICATIONS
TEACHING AID BASED ON CONTEXT ACTIVE CULTURAL BASED STUDY FOR LEARNING COMPILER DESIGN
19 ICCET22042 CONCEPT FOR STUDENTS
ANALYSIS OF KNN, LINEAR, RIDGE, LASSO, POLYNOMIAL REGRESSION AND SVM ALGORITHMS FOR
20 ICCET22034 MAXIMUM ACCURACY TO PREDICTING THE PRICE OF BITCOIN

21 ICCET22031 CHARMING SEWERAGE SPECIALIST CARE ARRANGEMENT USING EMBEDDED SYSTEM


HUMANA BRAIN-MOTIVATED MODEL FOR DISTINGUISHING EMOTIONAL STATES FOR AUSTIN
22 ICCET22054 DISORDER_CHATBOT

23 ICCET22033 SMART DELIVERY BOX BASED ON TENSORFLOW OBJECT DETECTION AND RECOGNITION API

24 ICCET22044 A NOVEL ENSEMBLED DEEP LEARNING MODEL FOR BIOMEDICAL QUESTION CLASSIFICATION
FORECASTING OF CROP YIELD IN VARIOUS CLIMATIC ZONES OF KARNATAKA USING PREDICTIVE
25 ICCET22046 ANALYTICS

26 ICCET22053 UN-STRUCTURED MEDICAL DATA DETECTION FOR AUTISM SPECTRUM DISORDER

27 ICCET22062 SIGN LANGUAGE CONVERTER USING FEATURE EXTRACTOR AND POSENET


SMART AND SUSTAINABLE HORTICULTURE USING INTERNET OF THINGS AND ARTIFICIAL INTELLIGENCE:
28 ICCET22068 A QUALITATIVE REVIEW
DENSITY BASED SUPPORT VECTOR MACHINE WITH OUTLIER FILTERS FOR REAL TIME ANALYSIS OF
29 ICCET22071 ROCKS AND STRUCTURES

30 ICCET22069 DESIGN OF 243 LEVEL TRINARY LADDER MULTILEVEL INVERTER USING VHDL

31 ICCET22065 A TRANSFER LEARNING-BASED DCNN FRAMEWORK FOR BRAIN TUMOUR MULTI-CLASSIFICATION


32 ICCET22067 PRE-SERVICE EDUCATION: A PRE-REQUISITE FOR THE TEACHERS OF NEW GENERATION ESL LEARNERS

33 ICCET22056 FACIAL RECOGNITION PROCESS USING MACHINE LEARNING ALGORITHMS: A REVIEW


PREDICTION OF RESPIRATORY DISEASES FROM AUDIO DATA CAPTURED THROUGH DIGITAL
34 ICCET22066 STETHOSCOPE AND SEVERITY ANALYSIS OF DISEASES

35 ICCET22063 A COMPARATIVE STUDY ON SELF-SOVEREIGN IDENTITY POWERED BY THE BLOCKCHAIN TECHNOLOGY

36 ICCET22079 CONDUCTION OF ONLINE EXAMINATIONS : A SURVEY

37 ICCET22083 DESIGN OF FUSION DIGITAL PULSE WIDTH MODULATION IN QUANTUM DOT CELLULAR AUTOMATA
EMOTIONAL INTELLIGENCE FOR SUSTAINABLE GROWTH OF ENTREPRENEURS: A REVIEW STUDY
38 ICCET22086 CONNECTED WITH WORK-LIFE BALANCE

39 ICCET220104 INFRA SOFT Α - OPEN(CLOSED) SETS ON INFRA SOFT TOPOLOGICAL SPACE

S.NO PAPER ID PAPER TITLE

40 ICCET22090 PREDICTION ON FIELD CROPS YIELD BASED ON TIME SERIES ANALYSIS DEEP LEARNING MODEL
ENERGY-EFFICIENT AND BALANCED LOAD ROUTING APPROACH USING BALD EAGLE SEARCH
41 ICCET220119 ALGORITHM FOR PATH CONVERGENCE IN MANET

42 ICCET22091 SECURITY ANALYSIS AND MITIGATION IN AUTONOMOUS VEHICLE


USE OF CARBON NANO TUBE (CNT) AS A WRAPPING MATERIAL TO THE BUILDING STRUCTURES TO
43 ICCET220122 CONTROL SALT DAMAGE
TRANSIENT RESPONSE ANALYSIS OF PV BASED NON- ISOLATED TWO PHASE INTERLEAVED BOOST
44 ICCET220117 CONVERTER FOR STANDALONE DC MICROGIRD

45 ICCET220112 OPTIMIZATATION OF PARTIALLY REPLACEMENT OF NANO – SIO 2 WITH CEMENT

46 ICCET22072 PERSONALIZED RECOMMENDER SYSTEM USING SENTIMENT AND EMOTION ANALYSIS FROM TWEETS
47 ICCET220137 GROUP {1,-1,I,-I} CORDIAL LABELING SOME DUPLICATE GRAPHS
MODELING OF FILTERS FOR GRID CONNECTED VOLTAGE SOURCE INVERTER USED IN RENEWABLE
48 ICCET220110 ENERGY RESOURCES

49 ICCET220113 SEISMIC ANALYSIS STEEL TRUSS BRIDGE USING SPLICES CONNECTION

50 ICCET220140 RECURRENCE OF GENERALIZED LIMITING RATIO RELATIONS

51 ICCET220153 A RELIABLE DATA TRANSMISSION USING AN ADAPTIVE ROUTING PROTOCOL FOR FANETS

52 ICCET220154 STUDIES ON PREPARATION OF SQUASH FROM COCONUT SPROUT


ENHANCEMENT OF REJECTION CHARACTERISTICS OF FILTER USING AN ARRAY OF CSRR FOR NOTCHING
53 ICCET220111 THE ISM BAND IN UWB ANTENNAS

54 ICCET220223 WIRELESS POWER TRANSFER SYSTEM FOR IMPROVED COIL GEOMETRY


ARTIFICIAL NEURAL NETWORKS AND PI HYBRID CONTROLLERS FOR AN ELECTRIC VEHICLE'S ENERGY
55 ICCET220169 STORAGE SYSTEM

56 ICCET220118 A SHORT REVIEW ON BATTERY MANAGEMENT SYSTEM FOR ELECTRIC VEHICLE


IMPACT OF WORK FROM HOME ON IT EMPLOYEES CONSIDERING THE PRODUCTIVITY, WORK LIFE
57 ICCET220143 BALANCE AND COLLEAGUESHIP

58 ICCET220155 RECOGNITION OF TRAFFIC INFORMATION WITH THE HELP OF SOCIAL MEDIA TWEETS
SENTIMENT ANALYSIS WITH SARCASM DETECTION USING OPTIMAL BIDIRECTIONAL LONG SHORT TERM
59 ICCET220189 MEMORY ON TWITTER DATA
IOT BASED DECISION SUPPORT SYSTEM FOR TELEHEALTH MANAGEMENT THROUGH DATA MINING FOR
60 ICCET220149 BIOMEDICAL EQUIPMENT
EFFECT OF SURFACE ROUGHNESS ON THE AERODYNAMIC AND AEROACOUSTIC PERFORMANCE OF THE
61 ICCET220187 DARRIEUS WIND TURBINE

62 ICCET220141 PCOD PREDICT FOR OBESE PATIENT USING NAFLD AND T2D PROFILES

63 ICCET220205 NETWORK SECURITY ATTACKS & TECHNIQUES TO SECURE THE NETWORKS


64 ICCET220206 METHODS FOR RESTRICTING UNWANTED ACCESS ON THE NETWORKS USING FIREWALL
COMBINING DATA OWNER- SIDE AND CLOUD-SIDE ACCESS CONTROL IN ATTRIBUTE BASED ENCRYPTED
65 ICCET220107 CLOUD STORAGE

66 ICCET220191 TRIPLE BAND U-SLOT ULTRA-WIDEBAND ANTENNA AS A WIRELESS SENSOR FOR COMMUNICATION

67 ICCET220201 MESH MESSAGING SERVICE USING BLUETOOTH


ANALYSIS AND OPTIMIZATION OF MACHINABILITY OF AL2O3 AND FLY ASH REINFORCED ALUMINUM
68 ICCET220184 HYBRID COMPOSITES USING CARBIDE INSERTS

69 ICCET220185 ANALYSIS OF THE UPSHOT OF HEAT TREATMENT ON PROPERTIES OF MAGNESIUM HYBRID COMPOSITES

70 ICCET220197 IMPROVING THE LIQUID INSULATION PERFORMANCE WITH ANTIOXIDANTS

71 ICCET220135 MULTIPLE VENDOR E-PLATFORMS FOR FARMERS

72 ICCET220145 Q LEARNING ALGORITHMS :AN INTRODUCTION


ACHIEVING MORE SECURITY IN ELECTRONIC MONEY FOR E-COMMERCE WEBSITE THROUGH
73 ICCET220134 CRYPTOGRAPHY

74 ICCET220131 SPAM DETECTION USING LINGUISTICS AND SPAMMER BEHAVIORAL


BIDIRECTIONAL VISITOR COUNTER WITH NO-MASK AND NO-ENTRY ALONG WITH AUTOMATIC ROOM
75 ICCET220157 LIGHT FAN CONTROLLER

76 ICCET220159 THE VEHICLE SERVICE MANAGEMENT SYSTEM

77 ICCET220130 MULTI-SOURCE MEDICAL DATA INTEGRATION AND MINING FOR HEALTHCARE SERVICES

78 ICCET220133 FAKE NEWS DETECTION USING MACHINE LEARNING

79 ICCET220156 AN EFFICIENT WAY TO PREDICT THE DISEASE USING MACHINE LEARNING

S.NO PAPER ID PAPER TITLE


80 ICCET220132 REAL TIME OBJECT DETECTION

81 ICCET220172 UNIFIED HEALTH CARE SYSTEM USING WEB FRAMEWORKS

82 ICCET220180 ALCOHOL DETECTION AND EMERGENCY ALERT SYSTEM

83 ICCET220181 DEVELOPMENT OF HUMAN RESOURCE: A CRITICAL ANALYSIS OF INDIA INNOVATION INDEX


AN OPTIMAL DEEP WAVELET AUTOENCODER -BASED DEEP NEURAL NETWORK WITH THE USE OF
84 ICCET220151 RIDERCUCKOO SEARCH ALGORITHM FOR CLASSIFICATION OF LUNG CANCER ON CT IMAGES

85 ICCET220207 A NOVEL METHOD OF APPROACHING TRANSPORTATION PROBLEM OF HEXAGONAL FUZZY NUMBER

86 ICCET220215 XGBOOST OPTIMIZED BY ADAPTIVE TREE PARZEN ESTIMATORS FOR CREDIT RISK ANALYSIS
A LIGHTWEIGHT RUBIK’S CUBE AND CHAOTIC-BASED IMAGE ENCRYPTION AND KEY GENERATION
87 ICCET220178 ALGORITHM FOR MULTIMEDIA INTERNET OF THINGS

88 ICCET220214 MUSIC RECOMMENDATION USING EMOTION RECOGNITION

89 ICCET220190 CLASSIFICATION OF YOGA HAND MUDRAS USING SIFT AND SURF FEATURES

90 ICCET220129 QUERY CACHING IN BIGDATA ANALYTICS

91 ICCET220211 DETECTION OF FACE MASK AND DISTANCE CALCULATION USING DEEP LEARNING

92 ICCET220218 PENETRATION TESTING TECHNIQUE WITH REVERSE SHELL ATTACK

93 ICCET220213 CONVERTING VOICE SIGNAL TO VISUAL INDIAN SIGN LANGUAGE

94 ICCET220273 MODIFIED MUSIC POPULARITY PREDICTION WITH DEEP LEARNING TECHNIQUES

95 ICCET220232 APPLICATION OF GIS TECHNIQUES IN CITY TRAFFIC


AN OVERVIEW ON ADVANCED GENETIC DISEASE DIAGNOSIS AND PREDICTION TECHNIQUES USING
96 ICCET220115 GENOME DATA
DEVELOPING A NEXT-GENERATION MULTITUDINOUS EPITOPE-BASED VACCINE AGAINST BIOTINIDASE
97 ICCET220230 DEFICIENCY; AN IMMUNOINFORMATICS BASED APPROACH

98 ICCET220194 PLANT DISEASE MANAGEMENT SYSTEM

99 ICCET220252 FACE MASK DETECTION USING VIOLA-JONES ALGORITHM

100 ICCET220250 ADVANCED DOORBELL TO PREVENT COVID-19 USING ARDUINO NANO

101 ICCET220234 UPPER LIMB ANATOMY LEARNING WITH VR


NEWS CLASSIFICATION FOR INDIAN LANGUAGES BASED ON THEIR HEADLINES USING MACHINE
102 ICCET220227 LEARNING AND DEEP LEARNING MODELS

103 ICCET220248 A/B TESTING FOR INDUSTRIAL COMAPANIES

104 ICCET220419 IMPROVED DIGITAL TWINNING TECHNIQUES FOR SMART SIMULATIONS

105 ICCET220418 MEDICAL CHATBOT USING MACHINE LEARNING AND NLP

106 ICCET220219 ASTHMA PREDICTION USING MACHINE LEARNING CLASSIFIERS

107 ICCET220248C A NOVAL APPROACH FOR WSN USING SHORTEST PATH (DIJKSTRAS ALGORITHM)

108 ICCET220248D IOT BASED SMART CHARGING SYSTEM

109 ICCET220248E A TOURISM MANAGEMENT WITH IMAGE SEARCH SYSTEM USING PIXABAY

110 ICCET220221 ML ASSISTED LOCALIZATION ALGORITHMS FOR INDOOR/OUTDOOR SETTINGS: AN INTROSPECTION


EVALUATION OF THE FUNCTIONAL ROLES PLAYED BY THE DORSOLATERAL PREFRONTAL CORTEX IN
111 ICCET220284 HUMAN COGNITION
RECENT TRENDS IN NEURAL NETWORK-BASED APPROACHES TO VISUAL PROCESSING VIS-À-VIS THEIR
112 ICCET220285 BIOLOGICAL CORRELATES IN THE BRAIN
EXPLORATIVE STUDY ON CHILDREN’S INTERNET USAGE AND PARENTAL CONTROL IN INDIA – USING
113 ICCET220257 CLASSIFICATION TREE MODEL ANALYSIS
114 ICCET220226 A REVIEW PAPER ON DIMENSIONALITY REDUCTION TECHNIQUES

115 ICCET220253 SOLAR PANEL DUAL MANAGEMENT SYSTEM

116 ICCET220242 SOCIAL IMPACT ASSESSMENT IN PROTECTED AREAS OF PANNA NATIONAL PARK, MADHYA PRADESH

117 ICCET220272 ATTRIBUTE BASED ACCESS CONTROL MODEL FOR EHR


IMPLEMENTING FUZZY LOGIC TO IMPROVE THE NETWORK SELECTION PROCESS FOR HETEROGENEOUS
118 ICCET220247 HANDOVER

119 ICCET220274 MEGAPSO: MOBILITY AWARE ENERGY EFFICIENT HYBRID GA & PSO BASED CLUSTERING FOR MANET

120 ICCET220238 WATER CONSUMPTION IN THE POWER SECTOR IN INDIA - PROBLEMS AND PROSPECTS

121 ICCET220283 RFID WIRELESS VEHICLES CHARGING STATION FOR ELECTRIC VEHICLES AND PAYMENT SYSTEM

S.NO PAPER ID PAPER TITLE

122 ICCET220287 ASSESSMENT OF VARIOUS MILK PARAMETER MONITORING SYSTEM USING AN IOT

123 ICCET220253A ONLINE FOOD ORDERING SYSTEM


DATA AUGMENTATION TECHNIQUES FOR DIAGNOSIS OF KERATOCONUS USING CONVOLUTIONAL NEURAL
124 ICCET220222 NETWORKS
IMPLEMENTATION OF DEEP NEURAL NETWORK MODEL FOR DETECTION OF HUNTINGTON'S DISEASE IN
125 ICCET220225 HUMAN DNA SEQUENCE

126 ICCET220258 DELAY OF NETWORK ISSUES AND CHALLENGES

127 ICCET220266 IMPLEMENTATION OF DATA INTEGRITY EVALUATION PROCESS IN CLOUD COMPUTING

128 ICCET220313 A REVIEW ON IMAGE CLASSIFICATION USING DEEP LEARNING


GIS-BASED QUANTITATIVE ASSESSMENT OF PUBLIC GREEN SPACE DISTRIBUTION IN LUCKNOW CITY,
129 ICCET220224 INDIA
DESIGN AND IMPLEMENTATION OF U-SLOT MICROSTRIP PATCH ANTENNA USING CO-AXIAL FEEDING
130 ICCET220281 TECHNIQUE FOR WLAN APPLICATIONS
EVALUATION OF CORE POINT DESCRIPTORS ENFORCED IN THE PEDESTRIAN IDENTIFICATION IN LOWER
131 ICCET220317 QUALITY IMAGES

132 ICCET220298 IN SILICO INTERACTION STUDIES OF SALACINOL WITH INHIBITORS OF IAP PROTEINS
IN SILICO SCREENING OF SNP'S IN PRION PROTEIN AND COMPARATIVE STUDIES BETWEEN
PHYTOCHEMICAL COMPOUNDS THAT INHIBIT PRION PROTEIN CAUSING NEURO-DEGENERATIVE
133 ICCET220297 DISEASES.
MULTI-OBJECTIVE VIRTUAL MACHINE PLACEMENT USING ORDER EXCHANGE AND MIGRATION ANT
134 ICCET220307 COLONY SYSTEM ALGORITHM

135 ICCET220310 EFFICIENT DESIGN OF SRAM CELL USING 90 NM TECHNOLOGY

136 ICCET220293 THIOPHENE AS A GAS SENSOR FOR THE ADSORPTION OF CARBONYL SULFIDE: DFT CALCULATIONS

137 ICCET220304 RASPBERRY PI BASED READER FOR BLIND

138 ICCET220250A TEMPERATURE PREDICTION USING MACHINE LEARNING ALGORITHMS

139 ICCET220302 CLASSIFICATION OF PADDY AND TOMATO CROPS DISEASES DETECTION USING CNN
DEEP LEARNING AND SWARM INTELLIGENCE BASED SYSTEM FOR SMART AGRICULTURE USING
140 ICCET220437 WIRELESS SENSOR NETWORKS

141 ICCET220336 SIGN LANGUAGE RECOGNITION USING DEEP LEARNING

142 ICCET220409 DETECTION OF OBJECTS USING MACHINE LEARNING


CODE COVERAGE - STUDY ON APPLICATIONS OF CODE COVERAGE METRICS FOR IMPROVING TEST
143 ICCET220414 EFFECTIVENESS

144 ICCET220413 DETECTING SKIN CANCER USING DEEP LEARNING

145 ICCET220374 COVID-19 INDOOR SAFETY MONITORING SYSTEM USING MACHINE LEARNING
146 ICCET220327 SENTIMENT ANALYSIS ON USER REVIEWS AND TWITTER DATA TO PREDICT VEHICLE SALES

147 ICCET220325 CHILD ADOPTION BASED ON FACIAL FEATURES AND SKIN COLOR

148 ICCET220328 SOCIAL MEDIA ADVERTISEMENT RESULT ANALYSIS


DETECTION OF VIRULENT MESSAGES ON PROPOSED DATASET WRITTEN IN CODE-MIXED HINDI-ENGLISH
149 ICCET220429 LANGUAGE USING NLP TECHNIQUES

150 ICCET220330 INTELLIGENT TRAFFIC FLOW USING MACHINE LEARNING

151 ICCET220321 DESIGN AND DEVELOPMENT OF SOLAR WATER PUMP WITH DIFFERENT TIME SLOTS FOR POWER SAVING

152 ICCET220446 DETECTING PASSIVE ATTACKS IN FINGERPRINT SPOOFING USING CONVOLUTION NEURAL NETWORK
PREDICTION OF COVID-19 & PNEUMONIA BY USING CONVOLUTIONAL NEURAL NETWORK AND
153 ICCET220415 DEPLOYMENT BY USING THE WEB FRAMEWORK

154 ICCET220323 TEMPERATURE CONTROLLED DC FAN USING SOLAR ENERGY


SECURED DATA TRANSMISSION FOR SMART GRID SYSTEM USING BLOCKCHAIN TECHNOLOGY WITH A
155 ICCET220373 TRUSTED GAMING TOKEN HONEYPOT ALGORITHM

156 ICCET220375 FRAUD CLAIMS DETECTION IN INSURANCE USING MACHINE LEARNING

157 ICCET220430 PHISHING SCAM IN THE MIDST OF THE UKRAINE CRISIS

158 ICCET220447 CROP ANALYSIS AND PREDICTION USING ENSEMBLE LEARNING

159 ICCET220455 PREDICTING STUDENT'S MARKS USING MACHINE LEARNING

160 ICCET220451 MODELING OF 2DMULTILAYER MOLYBDENUM DISULFIDE MOS 2 TRANSISTOR

161 ICCET220424 A STUDY TO EXPLORE HINDRANCES IN IMPLEMENTATION OF DATA MINING IN BANKS

S.NO PAPER ID PAPER TITLE


162 ICCET220393 DESIGN & IMPLEMENTATION OF BUS TRACKING SYSTEM UNDER IOT PLATFORM

163 ICCET220432 SENTIMENT ANALYSIS OF PRODUCT REVIEW

164 ICCET220262 VOICE BASED EMAIL FOR BLIND USING ARTIFICIAL INTELLIGENCE AND PYTHON

165 ICCET220427 PREDICTION OF DIABETES USING MACHINE LEARNING ALGORITHM

166 ICCET220420 RSSI BASED SAND THEFT PREVENTION

167 ICCET220422 A BRIEF REVIEW OF IMAGE CAPTIONING METHODS USING DEEP LEARNING APPROACH

168 ICCET220368 DETECTION OF CYBER ATTACK IN NETWORK USING DIFFERENT MACHINE LEARNING APPROACHES

169 ICCET220456 A CONTEMPLATION OF CLOUD SECURITY MENACES AND MITIGATION TECHNIQUES

170 ICCET220342 BLOOD BANK MOBILE APPLICATION OF IOT-BASED ANDROID STUDIO FOR COVID-19

171 ICCET220408 VIRTUALLY CONTROLLING COMPUTERS USING HAND GESTURE AND VOICE COMMANDS
A UNIFIED APPROACH FOR DETECTING TRAFFIC ACCIDENT AND ANALYSING THE ACCIDENT PRONE ZONE
172 ICCET220449 USING QUANVOLUTIONAL NEURAL NETWORKS

173 ICCET220309 PREDICTION OF HEART DISEASE USING MACHINE LEARNING ALGORITHMS

174 ICCET220410 CODE PINK A NEWBORN ABDUCTION DETECTION SYSTEM

175 ICCET220467 REAL TIME CRIME DETECTION USING GESTURE RECOGNITION


PERFORMANCE ENHANCEMENT OF FULLY HOMOMORPHIC ENCRYPTION AND DECRYPTION USING HIGH
176 ICCET220538 SPEED MULTIPLIER

177 ICCET220487 SMART ELECTRICITY DEMAND FORECASTING BY USING HYBRID ARIMA WITH LSTM ALGORITHM

178 ICCET220394 MODIFIED M-RCNN APPROACH (AOD-NET) FOR ABANDONED OBJECT DETECTION IN PUBLIC PLACES

179 ICCET220376 AUTONOMOUS HOME GARDENING SYSTEM USING IOT


180 ICCET220498 THERMAL IMPACT SENSITIVITY ANALYSIS OF FLASH POWDER MIXTURE FOR FIREWORKS APPLICATION
EVALUATION OF GROUNDWATER CHEMISTRY AND MULTIVARIATE STATISTICAL STUDIES IN PARTS OF
181 ICCET220388 TIRUPUR DISTRICT, TAMIL NADU, INDIA

182 ICCET220473 PREDICTION ON REAL ESTATE HOUSE PRICE USING REGRESSION MODELS

183 ICCET220445 DELAY NEURAL NETWORK ANALYSIS FOR LIP READING - NEURAL MACHINE TRANSLATION

184 ICCET220392 ON-ROAD VEHICLE BREAKDOWN ASSISTANCE


A SURVEY ON VARIOUS MACHINE LEARNING TECHNIQUES FOR AN EFFICIENT BRAIN TUMOR DETECTION
185 ICCET220595 FROM MRI IMAGES

186 ICCET220597 CLASSIFICATION OF DIABETIC RETINOPATHY DISEASE USING DEEP LEARNING

187 ICCET220377 ONLINE COLLABORATIVE DATA CACHING IN EDGE COMPUTING


MITIGATION OF FIRE AND EXPLOSION HAZARDS OF FLASH POWDER BY ADDING MONO AMMONIUM
188 ICCET220504 PHOSPHATE AS A SOLID INERTANT
A COMPREHENSIVE REVIEW ON TRACTION MOTORS COMPARISON,OVERVIEW OF OPTIMIZATION
189 ICCET220383 TECHNIQUES,RECENT AND FUTURE TRENDS IN ELECTRIC VEHICLE

190 ICCET220574 AI - BASED SMART IRRIGATION SYSTEM

191 ICCET220480 CUSTOMER SEGMENTATION USING NATURAL LANGUAGE PROCESSING


ENERGY EFFICIENT CH SELECTION & OPTIMAL RELAY NODE SELECTION ALGORITHM AND ITS
192 ICCET220530 PERFORMACE ANALYSIS FOR WIRELESS SENSOR NETWORKS

193 ICCET220432A ENERGY EFFICIENT STREET LIGHTING SYSTEM

194 ICCET220479 DEEP LEARNING BASED NEUROIMAGING ANALYSIS FOR PARKINSON’S DISEASE DETECTION
RECOMMENDATION SYSTEM FOR COLLEGE ELECTIVES USING ALS IMPLICIT COLLABORATIVE FILTERING
195 ICCET220513 AND LSTM NETWORK

196 ICCET220528 IOT BASED SMART SECURITY AND SURVEILLANCE SYSTEM


MITIGATING SHATTER BEHAVIOUR OF FIREWORKS BUILDING STRUCTURE USING REINFORCED HOLLOW
197 ICCET220500 BLOCK

198 ICCET220474 GESTURE RECOGNITION SYSTEM USING CONVOLUTED NEURAL NETWORKS AND TRANSFER LEARNING

199 ICCET220484 PRODUCT RECOMMENDATION ENGINE USING KNN AND K-MEAN


VISION AND INFRARED SENSOR BASED DISTANCE ESTIMATION FOR MICRO AERIAL VEHICLE
200 ICCET220337 NAVIGATION

201 ICCET220340 INDOOR MICRO AERIAL VEHICLE NAVIGATION USING OPTICAL FLOW

202 ICCET220493 BRAIN TUMOR DETECTION USING DEEP LEARNING

S.NO PAPER ID PAPER TITLE

203 ICCET220407 SEISMIC RESPONSE CONTROL OF IRREGULAR RCC BUILDING USING BRACING SYSTEM

204 ICCET220570 PERFORMANCE ANALYSIS OF SPATIO- TEMPORAL HUMAN DETECTED KEYFRAME EXTRACTION

205 ICCET220378 AN INTERACTIVE PHYSIOTHERAPIC EQUIPMENTS FOR CEREBRAL PALSIC CHILDREN

206 ICCET220582 FLY ASH AS MINERAL ADMIXTURE IN CONCRETE MATRIX – A STATE OF THE ART

207 ICCET220395 A REVIEW: BLOCKCHAIN & CRYPTOGRAPHY USED TO SECURE DATA


BIOMETRIC SYSTEM FOR FACE RECOGNITION USING TENSOR FLOW ON RASPBERRYPI FOR EDUCATIONAL
208 ICCET220533 INSTITUTIONS

209 ICCET220382 EFFECT OF SURFACE ROUGHNESS ON LEADING EDGE PROTUBERANCED WING


HYBRID RECOMMENDATION SYSTEM WITH GRAPH BASED AND COLLABORATIVE FILTERING
210 ICCET220577 RECOMMENDATION SYSTEMS
DRAIN CURRENT ANALYSIS OF MG0.25ZN0.75O/ MG0.6ZN0.4O/ZNO DOUBLE- CAVITY MOSHEMT BASED
211 ICCET220516 BIOSENSOR
DECENTRALIZED PAYMENT ARCHITECTURE FOR E-COMMERCE AND UTILITY TRANSACTIONS WITH
212 ICCET220532 GOVERNMENT VERIFIED IDENTITIES

213 ICCET220611 A REVIEW ON SECURE TECHNIQUES FOR KEYWORD-BASED SEARCH AND DATA SHARING

214 ICCET220641 DETECTING MALIGN REQUESTS USING HYBRID DEEP LEARNING MODEL WITH SEQUENCE-BASED LSTM

215 ICCET220679 LOW WEIGHTED HUMAN ACTIVITY RECOGNITION USING DEEP LEARNING

216 ICCET220681 CARDIAC DISEASE ANALYSIS USING MACHINE LEARNING

217 ICCET220486 REAL TIME CROWD ANALYSIS

218 ICCET220494 SMART BLIND STICK WITH IMAGE TO SPEECH CONVERSION

219 ICCET220529 IMPLICATIONS OF THE EXTERNAL FLOW AND ACOUSTICS ON LATERAL UPWARD SMOLDERING

220 ICCET220651 DISEASE PREDICTION USING MACHINE LEARNING ALGORTIHMS

221 ICCET220636 STUDENTS LIVE BEHAVIOUR MONITORING IN ONLINE CLASSES USING ARTIFICIAL INTELLIGENCE

222 ICCET220698 DETECTION OF POTHOLES USING IOT

223 ICCET220550 STEGANALYSIS TECHNIQUES: A SYSTEMATIC REVIEW

224 ICCET220542 ONLINE SECURE VOTING SYSTEM USING SMART CONTRACTS

225 ICCET220546 SUICIDAL IDEATION DETECTION USING MACHINE LEARNING TECHNIQUES


AN ADAPTIVE SEMANTIC APPROACH FOR SOCIAL RECOMMENDATION USING CONTENT BASED
226 ICCET220426 ALGORITHM

227 ICCET220572 AUTONOMOUS FIRE DETECTING AND EXTINGUISHING ROBOT

228 ICCET220523 AN IMPROVED ECOURT SYSTEM WITH SUSPECT PREDICTION USING HAARCASCADE ALGORITHM

229 ICCET220685 MODIFIED PARABOLIC SOLAR COLLECTOR HOT-AIR TRAY DRYER


230 ICCET220366 CONTINUOUS SIGN LANGUAGE ESTIMATION USING LSTM

231 ICCET220604 LARGE SCALE PROCESSING OF SIGNALS IN NETWORK ENVIRONMENT

232 ICCET220658 SECURED BLOCKCHAIN TECHNOLOGY FOR AGRICULTURE FOOD SUPPLY CHAIN

233 ICCET220657 SMART HEALTH PREDICTION USING MACHINE LEARNING ALGORITHMS

234 ICCET220630 ANALYZING IMAGE DENOISING USING GENERATIVE ADVERSARIAL NETWORK


ENGINEERING A NOVEL RECRUITMENT SYSTEM USING GRADIENT BOOSTED DECISION TREE ALGORITHM
235 ICCET220713 AND BUSINESS INTELLIGENCE PRINCIPLES
A NOVEL APPROACH FOR NEXT GENERATION BUSINESS BY USING PARALLEL AND DISTRIBUTED DEEP
236 ICCET220627 LEARNING

237 ICCET220701 DECENTRALIZING ELECTRONIC MEDICAL RECORDS ON THE BLOCKCHAIN USING SMART COBTRACTS

238 ICCET220596 PRESERVING DATA PRIVACY IN WIRELESS COMMUNICATION IN IOT

239 ICCET220625 MUSIC GENRE CLASSIFICATION

240 ICCET220732 THE UNUSED POTENTIAL OF PROGRESSIVE WEB APPLICATIONS (PWA)

241 ICCET220571 DEDUCTION MANAGEMENTSOFTWARE

242 ICCET220704 GROUPING OF CUSTOMERS USING CLASSFICATION ALGORITHS

243 ICCET220667 WHEEL RIM RADIAL FATIGUE LIFE ANALYSIS CONSIDERING STEERING GEOMETRY

244 ICCET220676 A SURVEY ON KEY TECHNOLOGY AND DECISION-MAKING IN SELF-DRIVING CARS

S.NO PAPER ID PAPER TITLE

245 ICCET220677 FEATURE EXTRACTION FOR ENGLISH LANGUAGE USING NLP


246 ICCET220734 STOCK ANALYSIS AND AUTOMATION USING MACHINE LEARNING

247 ICCET220629 TO DETECT SIGNATURE-BASED MALWARE USING MACHINE LEARNING

248 ICCET220620 DESIGN AND DEVELOPMENT OF ELECTRONIC VOTING MACHINE

249 ICCET220560 A SURVEY ON LEARNING MODELS OF REINFORCEMENT LEARNING

250 ICCET220471 AN ENSEMBLE APPROACH FOR DETECTION AND CLASSIFICATION OF FAKE NEWS

251 ICCET220602 ML-BASED OFFENSIVE TWEET ACCURACY DETECTOR ON SOCIAL MEDIA


COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING TECHNIQUES FOR PREDICTING DIABETICS
252 ICCET220724 DISEASE

253 ICCET220750 AN INTELLIGENT TRAFFIC LIGHT CONTROL SYSTEM USING CONVOLUTIONAL NEURAL NETWORK

254 ICCET220770 ONLINE STUDENT CAREER GUIDE PORTAL

255 ICCET220499 AUTOMATION ON MAINTAINING OF SOIL MOISTURE LEVEL IN EARTHING PIT

256 ICCET220647 MACHINE LEARNING AND STOCK MARKET ANALYSIS

257 ICCET220752 PREDICTION AND DETECTION OF FOREST FIRE BASED ON DEEP-LEARNING APPROACH

258 ICCET220331 IMPROVISING AIR QUALITY FORECASTING USING MACHINE LEARNING

259 ICCET220621 INHIBITORY POTENTIAL OF NATURAL PLANT PRODUCTS AGAINST INFLUENZA VIRUS

260 ICCET220689 BIOMETRIC AUTHENTICATION ON FINGER VEIN RECOGNITION

261 ICCET220720 THERMAL WRAPPER USING T-CALL ESP32 SIM800L

262 ICCET220616 IOT BASED ENERGY MONITORING SYSTEM


A UNIFIED, SIMPLIFIED, AND INNOVATIVE TACTIC PREDICTION OF CUSTOMER CHURN FOR BANK
263 ICCET220765 CUSTOMERS
264 ICCET220649 BLOCKCHAIN APPLICATION IN INCENTIVIZING STUDENTS ON PARTICIPATION IN ONLINE CLASSES

265 ICCET220718 YIELD FORECASTING OF OILSEEDS USING MACHINE LEARNING TECHNIQUES

266 ICCET220886 COMMUNITY MONITORING SYSTEM FOR COVID-19 PREVENTION

267 ICCET220603 DECENTRALIZED SOCIALMEDIA APPLICATION WITH CHAT AND NFT MARKETPLACE

268 ICCET220556 NLP BASED QUESTION & ANSWERING SYSTEM


A NOVEL DATA-DRIVEN OPTIMAL METHODOLOGY FOR DETECTING SHIP FROM SAR IMAGES BASED ON
269 ICCET220839 ARTIFICIAL INTELLIGENCE

270 ICCET220318 METHODOLOGY TO IMPLEMENT HOME AUTOMATION SYSTEM USING FPGA BASYS 3 BOARD

271 ICCET220705 VIRTUAL CLASSROOM

272 ICCET220746 A SURVEY OF IMAGE PROCESSING TOOLS PACKAGE

273 ICCET220673 INTERNET OF THINGS(IOT) AND ITS APPLICATIONS: A REVIEW

274 ICCET220803 MODELING AND CONTROL OF DC-DC CONVERTERS

275 ICCET220631 AI BASED E-COMMERCE WEB APPLICATION FOR EVENT MANAGEMENT


CORRELATION BETWEEN THE DEPENDENT AND INDEPENDENT PARAMETERS IN THE EXTENDED
276 ICCET220585 HODGKIN AND HUXLEY NEURON MODEL USING PARTIAL LEAST SQUARE REGRESSION TECHNIQUE

277 ICCET220586 ONLINE ELECTRICITY BILLING SYSTEM

278 ICCET220607 MODELLING A VOTING-BASED MODEL FOR DIABETES PREDICTION USING LEARNING MODELS
STUDY OF ELECTRO-MECHANICAL PROPERTIES OF FDM MATERIAL USING DIFFERENT COATING
279 ICCET220690 COMPOSITIONS

280 ICCET220591 FOORPTINTING AND RECONNAISSANCE TOOL

281 ICCET220632 DESIGN AND ANALYSIS OF SOLAR AND WIND BASED CHARGING STATION FOR ELECTRIC VEHICLES
REMOVAL OF CHROMIUM VI IONS FROM TANNERY EFFLUENT USING EMULSION LIQUID MEMBRANE
282 ICCET220683 AND OPTIMIZATION OF PARAMETERS USING RESPONSE SURFACE METHADOLOGY

283 ICCET220810 WASTE MANAGEMENT AND WEALTH GENERATION THROUGH WASTE ELIMINATION

284 ICCET220693 IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD (AES) ON FPGA

285 ICCET220610 REGULARIZATION IN NEURAL NETWORKS


INVESTIGATION OF VARIOUS SUPERVISED MACHINE LEARNING ALGORITHM TO CHARACTERIZE
286 ICCET220794 MAMMOGRAM BREAST IMAGES ELECTRONIC AND COMMUNICATION ENGINEERING

S.NO PAPER ID PAPER TITLE


A LITERATURE REVIEW OF BLOCKCHAIN AND GAMIFICATION BASED INCENTIVE MECHANISM IN
287 ICCET220702 EDCUACTION SECTOR

288 ICCET220592 STOCK MARKET PREDICTION USING MACHINE LEARNING


A WEIGHTED MULTIVARIABLE ADAPTIVE REGRESSION MODEL FOR DELIVERY TIME PREDICTION IN
289 ICCET220638 ECOMMERCE SUPPLY CHAIN

290 ICCET220699 A MACHINE LEARNING BASED FAULT DETECTION FOR PREDICTIVE ANALYSIS OF MACHINE

291 ICCET220545 NON-INVASIVE METHOD TO DETECT DIABETICS


SUPLYING ADJUSTABLE POWER SUPPLY TO THE BIOMEDICAL DEVICES BY USING INTERNET OF THINGS
292 ICCET220579 (IOT)

293 ICCET220731 E-COMMERCE: CONCEPT AND DESIGN

294 ICCET220558 BITCOIN PRICE PREDICTION USING MACHINE LEARNING ALGORITHMS

295 ICCET220766 A STUDY ON IMPROVING BUSINESS EXCELLENCE IN SUPERSTORES

296 ICCET220762 ANALYZING FACTORS AFFECTING YOUTUBE VIDEOS TO BECOME TRENDING VIDEO

297 ICCET220736 COVID-19 PREDICTION USING MACHINE LEARNING USING REAL WORLD DATA
COST EFFECTIVE, 3D PRINTED BINIC ARM MECHANICAL DESIGN CONTROLLED BY ELECTROMYOGRAPHIC
298 ICCET220561 SIGNALS

299 ICCET220656 FINGER VEIN DETECTION USING DEEP LEARNING

300 ICCET220749 MACHINE LEARNING APPROACH TO CLASSIFY AND PREDICT OSTEOSARCOMA GRADING

301 ICCET220767 ROAD SURFACE CLASSIFICATION THROUGH VEHICLE VIBRATION SINGAL PROCESSING
PREPARATION OF HEAT RESISTANCE AND FIRE-RETARDANT COATING USING SILICONE POLYESTER RESIN
302 ICCET220789 DOPED WITH AL2O3

303 ICCET220922 INTELLIGENT DIGITAL IMAGE WATERMARKING USING WAVELET TRANSFORM

304 ICCET220941 AI BASED ALGORITHMS FOR COMPUTER AIDED DIAGNOSIS


EXAMINING FAKE NEWS OBSERVATION AND DETECTION IN SOCIAL MEDIA: USING MACHINE LEARNING
305 ICCET220819 AND DEEP LEARNING ALGORITHMS

306 ICCET220267 ROLE OF INTELLIGENT CAD SYSTEMS FOR REAL WORD APPLICATIONS - A REVIEW

307 ICCET220664 AN APPROACH TO DETECT BRAIN MALIGNANCY USING BAT ALGORITHM

308 ICCET220903 SINGLE IMAGE DEHAZING USING MULTI-SCALE DCP-BCP FUSION

309 ICCET220798 PHOTOLUMINESCENCE OF ER-DOPED KNN CERAMICS

310 ICCET220578 ONLINE PROCTORING SYSTEM USING IMAGE PROCESSING AND MACHINE LEARNING

311 ICCET220813 WEATHER FORECASTING USING MACHINE LEARNING

312 ICCET220937 DRIVER DROWSINESS DETECTION

313 ICCET220913 AUGMENTED ANALYTICS: A REVIEW OF CURRENT TRENDS AND FUTURE CHALLENGES

314 ICCET220719 AUTOGRICULTURE – AN HI-TECH AGRICULTURAL FRAMEWORK

315 ICCET220740 DETECTION OF PHISHING WEBSITES USING MACHINE LEARNING


316 ICCET220899 COMPUTER SECURITY RISK ANALYSIS IN DISTANCE LEARNING
CUSTOMER CHURN PREDICTION - A COMPARISON BETWEEN STOCHASTIC GRADIENT DESCENT AND
317 ICCET220741 NEURO-EVOLUTION

318 ICCET220717 HITECH AGRI - CROP RECOMMENDATION SYSTEM

319 ICCET220743 BIOACTIVE PHYTOCHEMICALS: A PROMISING TREATMENT FOR CANCER

320 ICCET220911 COMPASSION:ONE MORE STEP AGRICULTURE MANAGEMENT SYSTEM

321 ICCET220581 DESIGN OF HEART RATE EQUIPMENT BASED ON IOT WHILE RIDING VEHICLE

322 ICCET220748 SEWAGE BLOCK DETECTION SYSTEM

323 ICCET220773 DATA SCIENCE AND AI/ML IN CONSTRAINING TAX EVASION

324 ICCET220962 A REVIEW AND PROPOSAL OF AN INNOVATIVE APPROACH FOR E-LEARNING PLATFORM

325 ICCET220935 CONVERSION OF SIGN LANGUAGE INTO TEXT AND SPEECH USING DEEP LEARNING
THERMAL DEGRADATION OF POLYVINYL CHLORIDE (PVC) MODIFIED BY HYDROXYAPATITE NANO
PARTICLES
326 ICCET220838
BRAIN DISEASE CLASSIFICATION & BRAIN TUMOR ESTIMATION USING CNN

327 ICCET220900

S.NO PAPER ID PAPER TITLE


QUANTIFICATION OF MODIFIER IN POLYMER MODIFIED BITUMEN USING FOURIER TRANSFORM
INFRARED RADIATION (FTIR) SPECTROMETER AN INVESTIGATIVE STUDY TO CURB ADULTERATION IN
328 ICCET220758 MODIFIED BITUMEN

329 ICCET220745 CONTACTLESS COVID TESTING BOOTH WITH PATIENT TRACKING AND MONITORING
330 ICCET220454 CROP YIELD PREDICTION IN SMART FARMING USING MACHINE LEARNING

331 ICCET220918 APPOINT US


SENTIMENTAL CLASSIFICATION ON ONLINE CUSTOMER REVIEWS BY USING NATURAL LANGUAGE
332 ICCET220721 PROCESSING

333 ICCET220663 FLOOD INTENSITY PREDICTION VIA ENSEMBLE MACHINE CODE MODEL

334 ICCET220659 CONTROL OF FUEL CELL BASED SUPERLIFT LUO CONVERTER


PREDICTION OF STUDENT PERFORMANCE BASED ON TEXT MINING USING NEURAL NETWORKS - A
335 ICCET220888 REVIEW
A CHAOTIC SALP SWARM FEATURE SELECTION ALGORITHM FOR ORANGE AND TOMATO PLANT LEAF
336 ICCET220979 DISEASE DETECTION

337 ICCET220792 BIRD WATCHER USING DEEP LEARNING

338 ICCET221022 FACE RECOGNITION BASED ATTENDANCE MANAGEMENT SYSTEM

339 ICCET221045 CHALLENGES IN HYBRID APPLICATION DEVELOPMENT: A CASE STUDY


DESIGN AND DEVELOPMENT OF MULTI-PURPOSE 3D MODELLED PORTABLE POWER BANK USING 18650
340 ICCET220774 LITHIUM-ION BATTERY
EFFECTS OF PROCESS PARAMETERS THAT AFFECT THE MICROSTRUCTURE OF ALUMINIUM ALLOY: A
341 ICCET221050 REVIEW

342 ICCET220957 IOT-BASED SYSTEM FOR DETECTING AND FORECASTING INDUSTRIAL FIRE

343 ICCET220799 FRICTION STIR WELDING OF ALUMINIUM ALLOY PLATES WITH THREADED PIN TOOL: A REVIEW

344 ICCET220997 FILTERING THEORY FOR QUANTUM STRING IN NOISE

345 ICCET220996 NEW MOS SQUARE-LAW TRANSCONDUCTOR

346 ICCET220726 DATA SECURITY AND PRIVACY PROTECTION FOR CLOUD STORAGE
347 ICCET220949 DRIVER'S DROWSINESS DETECTION USING DEEP LEARNING

348 ICCET220710 HEART DISEASE PREDICTION AND DETECTION SYSTEM

349 ICCET220754 BLIND IMAGE QUALITY ASSESSMENT WITH IMAGE DENOISING: A SURVEY

350 ICCET220982 HOUSEHOLD MANAGEMENT WEBSITE FOR RURAL AREAS

351 ICCET220928 SPEAKER IDENTIFICATION FROM VOICE

352 ICCET220778 BIOCATALYTIC POTENTIAL OF PROTEASE AND AMYLASE ENZYME ON WASTE TANNERY EFFLUENT

353 ICCET221058 MANAGERIAL EFFICIENCY WITH PRICE SENSITIVE DEMAND

354 ICCET220626 EFFECTIVE TAMIL HANDWRITTEN CHARACTER RECOGNITION USING DEEP LEARNING TECHNIQUE
ADAPTIVE AND INTEGRATED TEXT MINING FOR ASSESSING MASSIVE OPEN ONLINE COURSES (MOOC)
355 ICCET220782 USING VECTOR SPACE MODEL

356 ICCET220152 ATTENDANCE MONITORING SYSTEM USING OPENCV

357 ICCET220158 CLOUD NETWORK MANAGEMENT SYSTEM

358 ICCET220133 FAKE JOB FORECAST USING DATA MINING TECHNIQUES

359 ICCET220161 CYBER ATTACK DETECTION SYSTEM

360 ICCET220126 MUSIC CLASSIFICATION MANAGEMENT SYSTEM

361 ICCET220756 SECURITY LEVEL DETECTION OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING MODEL

362 ICCET220639 DETECTION OF PARKINSON’S DISEASE USING DEEP LEARNING ALGORITHMS

363 ICCET220742 TEA LEAF DISEASE DETECTION USING DEEP LEARNING

364 ICCET220367 REAL AND FAKE NEWS CLASSIFICATION USING NATURAL LANGUAGE PROCESSING
365 ICCET220923 A SURVEY OF CYBER CRIMES AND CYBER SECURITY

366 ICCET220946 MODELLING A NOVEL LEARNING-BASED APPROACH FOR COVID-19 PREDICTION

367 ICCET220682 IOT BASED REAL-TIME HEALTH CARE MONITORING SYSTEM FOR COMPLEX EVENT PROCESSING

368 ICCET220917 DESIGN AND IMPLEMENTATION OF INTEGRATED EVACCINATION CHIP FOR COVID-19

S.NO PAPER ID PAPER TITLE

369 ICCET221061 CHARACTERISTIC ANALYSIS OF OFDM-OQAM SYSTEM IN BELOW DECK SHIP ENVIRONMENT
A XTREME FEATURE-BASED BOOSTING MODEL FOR HEART DISEASE PREDICTION USING FEATURE
370 ICCET220920 REPRESENTATION

371 ICCET221062 HEART RATE MONITORING , HEART ATTACK DETECTION AND PREDICTION
DEVELOPMENT OF NON-INVASIVE CONTINUOUS PATIENT GLUCOSE BOTTLE LEVEL AND HEALTH CARE
372 ICCET220992 MONITORING SYSTEM USING IOT

373 ICCET220940 DESIGN AND DEVELOPMENT OF ANESTHESIA CONTROLLER

374 ICCET220829 TEXTURE BASED CLASSIFICATION OF LIVER CANCER USING ULTRASOUND IMAGES

375 ICCET221066 A LANGUAGE BASED SYSTEM ARCHITECTURE FOR MULTIPLANAR CRYPTOSYSTEMS

376 ICCET221090 PROTECTION OF IOT USING BLOCKCHAIN: A SURVEY

377 ICCET220944 CYBERBULLYING DETECTION IN SOCIAL MEDIA USING MACHINE LEARNING


PREPARATION AND CHARACTERIZATION OF PROSOPIS JULIFLORA STEM ACTIVATED CARBON FOR
378 ICCET221109 METHYLENE BLUE DYE ADSORPTION

379 ICCET221048 FINITE ELEMENT MODELING FOR RUTTING IN FLEXIBLE PAVEMENT

380 ICCET221069 A TRIFOLD ELECTRONICS SURVEILLANCE SYSTEM USING IMAGE PROCESSING


381 ICCET221071 ANALYSIS OF PILED RING FOUNDATIONS IN MEDIUM DENSE SAND USING EXPERIMENTAL APPROACH
ROLLER COMPACTOR CUM RUT ANALYSER, AN EQUIPMENT FOR PAVEMENT TESTING AND BITUMINOUS
382 ICCET221043 MIX DESIGN

383 ICCET221018 PROSTATE CANCER DETECTION USING DEEP LEARNING & TRADITIONAL TECHNIQUES

384 ICCET220971 ROAD SIGNS CLASSIFICATION USING TRANSFER LEARNING

385 ICCET220889 DETECTION OF DDOS ATTACK USING MACHINE LEARNING


ADDITIVE MANUFACTURING ASPECTS FOR DESIGN AND DEVELOPMENT OF GARBAGE PICKING MACHINE
386 ICCET221056 COMPONENTS FOR COMPACT DESIGN

387 ICCET220828 MORPHOLOGICAL DESCRIPTORS BASED URBAN CHANGE DETECTION USING REMOTE SENSING IMAGES
NUMERICAL INVESTIGATION OF FLOW OVER AN OSCILLATING CIRCULAR CYLINDER AT LOW REYNOLDS
388 ICCET220939 NUMBER

389 ICCET221072 INVESTIGATION OF FIBRE-BASED BAG FILTER COATED WITH METAL OXIDES FOR DUST ADSORPTION
NUMERICAL ANALYSIS OF FLUID FLOW OVER PLUNGING NACA0012 AIRFOIL AT LOW REYNOLDS NUMBER
390 ICCET220952

391 ICCET221028 DESIGN OF EFFICIENT TOPOLOGY IN TIME EVOLVING AND ENERGY HARVESTING

392 ICCET220805 CRYPTOCURRENCY PREDICTION:METHODS,TECHNIQUES AND TOOLS


NUMERICAL STUDIES ON THE INFLUENCE OF SURFACE HEATING ON THE FLOW CHARACTERISTICS OF A
393 ICCET220912 CONVENTIONAL TESLA VALVE
ENHANCING OBJECT DETECTION IN AUTONOMOUS DRIVING USING YOLOV4 AND DEHAZING
394 ICCET220815 ALGORITHMS

395 ICCET220965 FACE RECOGNITION AND ATTENDANCE MARKING USING MACHINE LEARNING
A NEW OTA-BASED SHADOW FILTER PROVIDING INDEPENDENT ELECTRONIC CONTROLS OF Ω0 AND
396 ICCET221057 BANDWIDTH

397 ICCET220820 BLOOD VESSEL SEGMENTATION AND CLASSIFICATION IN FUNDUS IMAGE


DETECTION OF CYBERBULLYING IN SOCIAL MEDIA USING RECURRENT NEURAL NETWORK
398 ICCET221044 ARCHITECTURES
APPLICATION OF DEEP LEARNING CONCEPT IN DERMOSCOPIC IMAGES FOR HAIR SEGMENTATION AND
399 ICCET221044A REMOVAL

400 ICCET220921 VISUAL CUES TO VOICE CUES

401 ICCET221015 A NEW COMPUTATIONAL INTELLIGENCE APPROACH TO UNDERSTAND AUTISM SPECTRUM DISORDERS

402 ICCET220827 IOT BASED CONSERVATION AND MONITORING OF NATURAL RESOURCES IN DAY-TO-DAY LIFE

403 ICCET220894 PREVENTION OF SQL INJECTION ATTACKS IN WEB APPLICATIONS

404 ICCET220823 LUNG CANCER DETECTION USING DEEP LEARNING TECHNIQUE

405 ICCET220931 MRI SEGMENTATION OF LUNGS USING LEARNED SEMANTIC KNOWLEDGE AND GRAPH CUTS

406 ICCET221070 DESIGN OF D FLIP – FLOP USING KISAN GATE

407 ICCET221093 FISHING VESSELS MONITOIRNG SYSTEM


PERFORMANCE EVALUATION OF CNN-SVM CLASSIFIER FOR DIAGNOSING CORONARY ARTERY
408 ICCET221037 BLOCKAGE

409 ICCET221021 INSECT CLASSIFICATION USING DEEP LEARNING

S.NO PAPER ID PAPER TITLE


ADVANCED MULTI SWARM INTELLIGENT ANT COLONY OPTIMIZATION ALGORITHM FOR VIRTUAL
410 ICCET221039 MACHINE PLACEMENT PROBLEM IN CLOUD PLATFORM
PERFORMANCE ANALYSIS OF MACHINE LEARNING AND DEEP LEARNING ALGORITHMS IN CREDIT CARD
411 ICCET221009 FRAUD DETECTION

412 ICCET221031 DESIGN AND IMPLEMENTATION OF AN AUTOMATED AGRICULTURE MONITORING AND CONTROL
413 ICCET220219A SURVEY ON AI BASED CAR PARKING SYSTEM
FRAMEWORK FOR NETWORK THROUGHPUT MAXIMIZATION TO PROLONG LIFE TIME OF WIRELESS
414 ICCET220990 SENSOR NETWORKS

415 ICCET221124 SOLAR IRRADIANCE VALUE BASED OPTIMAL OPERATING ELECTRIC ASSEMBLY DESIGN

416 ICCET221065 WEB BASED INTERNSHIP PORTAL

417 ICCET221042 A VANET BASED ACCIDENT DETECTION AND MANAGEMENT SYSTEM IN A SMART CITY

418 ICCET221118 SENTIMENT ANALYSIS OF TWITTER DATA REGARDING RUSSIA UKRAINE WAR

419 ICCET221105 IOT BASED ACCIDENT PREVENTION AND INTIMATION SYSTEM

420 ICCET221080 ANALYZING THE EFFECTS OF LOTTERY SCHEDULER


PREDICTION OF CROP YIELD PRODUCTION USING HYBRID RANDOM FOREST MODEL IN MACHINE
421 ICCET221088 LEARNING

422 ICCET221049 FOOD ALLERGY PREDICTION SYSTEM

423 ICCET221053 STOCK MARKET PREDICTION USING LSTM

424 ICCET221078 FRICTION STIR WELDING OF ALUMINIUM ALLOY PLATES USING CYLINDRICAL TOOL: A REVIEW

425 ICCET221055 DEEP LEARNING BASED DEFORESTATION CLASSIFICATION USING CNN

426 ICCET220804 METHODOLOGY TO IMPLEMENT IMAGING APPLICATIONS ON FPGA BASYS 3 BOARD


CHARACTERIZATION OF SOIL BY SCANNING ELECTRON MICROSCOPY WITH ENERGY DISPERSIVE X-RAY
427 ICCET221126 SPECTROSCOPY

428 ICCET221003 SMART CARD BASED E-HEALTH RECORD

429 ICCET221029 SMART MEDIC ASSIST IN TRAIN USING IOT

430 ICCET221148 EAR DETECTION IN UNCONSTRAINED ENVIRONMENT USING FASTER R-CNN


431 ICCET221216 IMPROVEMENT IN ENGINEERING BEHAVIOUR OF BLACK COTTON SOIL USING GGBS

432 ICCET221110 AGRICULTURE OPTIMIZATION AND LIFE ANALYSIS OF A PLANT USING IOT

433 ICCET221150 REAL TIME IMPLEMENTATION OF FACIAL RECOGNITION

434 ICCET221142 A STUDY ON IOT BOTNET DETECTION TECHNIQUES

435 ICCET221165 MOVABLE PLATFORM FOR SOLAR POWER GENERATION

436 ICCET221159 A SYSTEMATIC LITERATURE REVIEW ON DEEP LEARNING BASED MEDICAL IMAGE SEGMENTATION

437 ICCET21176 IOT BASED ASSIST DEVICE FOR MONITORING STROKE PATIENT

438 ICCET221103 INSTANT VEHICLE INSURANCE RENEWAL SYSTEM

439 ICCET221167 DATA SCIENCE APROACH TO STOCK PRICE FORECASTING IN INDIA

440 ICCET221201 IOT CONTROLLED LAWNMOWER

441 ICCET221190 SMART APPLICATION BASED PARKING SYSTEM USING INTERNET OF THINGS

442 ICCET221127 DESIGN AND DEVELOPMENT OF A NOVEL ACCIDENT DETECTION AND EMERGENCY REPORTING SYSTEM
BIO-CERAMIC COATING FOR KNEE IMPLANTS FOR BETTER INTERFACE BETWEEN BONE TISSUES AND
443 ICCET221166 TITANIUM METALS

444 ICCET221083 SMART SURVEILLANCE USING MOBILENETV2

445 ICCET221164 ANOMALY BASED INTRUSION DETECTION SYSTEM USING HYBRID MACHINE LEARNING ALGORITHMS

446 ICCET221084 IOT BASED INDUSTRIAL ADOPTATION CONTROL FOR USING WIND ENERGY CONVERSION SYSTEM

447 ICCET221149 IOT BASED ENVIRONMENT MONITORING SYSTEM

448 ICCET221225 PROTECTING CROPS FROM WILD AND DOMESTIC ANIMALS INTRUSION USING DEEP LEARNING
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM USING DEEP LEARNING ALGORITHM AND IMAGE
449 ICCET221004 PROCESSING TECHNIQUES

450 ICCET221193 SYSTEMATIC INVESTIGATION ON CLOUD ASSISTED IOT DEVICES, CHALLENGES AND APPLICATIONS
CARBON EMISSION CONSIDERATION IN A FUZZY INVENTORY MODEL UNDER HYBRID PAYMENT POLICY
451 ICCET221157 AND TRADE CREDIT FINANCING

S.NO PAPER ID PAPER TITLE

452 ICCET221131 BUS TICKET BOOKING SYSTEM USING CLOUD COMPUTING

453 ICCET220916 PERPETUAL PRESERVATION OF PESTICIDE FREE PRODUCTS USING IOT

454 ICCET221129 YDR'S BROWSER

455 ICCET221137 MODERN DAY SMART HOME WITH E-BILLING

456 ICCET221074 ETHEREUM BASED BLOCKCHAIN FOR SECURED TRANSACTION IN WSN


DETECTION AND CLASSIFICATION OF CERVICAL CANCER BASED ON ELEPHANT HERDING OPTIMIZATION
457 ICCET221114 ON CONVOLUTIONAL NEURAL NETWORK

458 ICCET221231 STUDY ON EFFECT OF FOUNDATION SOIL ON MASS IRREGULAR BUILDINGS UNDER SEISMIC LOADS

459 ICCET220757 CUSTOMER CHURN PREDICTION USING MACHINE LEARNING

460 ICCET220841 FAKE REVIEW DETECTION SYSTEM

461 ICCET221177 SMART PORTABLE DUSTBIN WITH METHANE DETECTOR USING NODE MCU
A SMART CONTRACT BASED ACCESS CONTROL FRAMEWORK FOR CLOUD BASED SMART HEALTHCARE
462 ICCET220775 SYSTEM

463 ICCET221233 A BRIEF REVIEW OF E-NOSE FOR QUALITY ANALYSIS OF MATERIALS IN DIFFERENT CATEGORIES
SIMULATING SUBJECTIVE OPINIONS ON WOMEN’S SAFETY IN HIGHER EDUCATION CAMPUSES USING AN
464 ICCET221079 ARTIFICIAL INTELLIGENCE-DRIVEN DESIGN FRAMEWORK

465 ICCET221198 SYSTEMATIZED VLSI ARCHITECTURE FOR AES ALGORITHM

466 ICCET221161 AUTO ATTENDANCE SYSTEM FROM SINGLE IMAGE OF THE CLASSROOM USING FACE RECOGNITION
A USER EXPERIENCE STUDY ON RESPONSIVE MOBILE TOURISM WEBSITES' PERCEIVED USABILITY,
467 ICCET221133 ATTRACTIVENESS, AND INTUITIVENESS

468 ICCET221237 REAL TIME MONITORING OF CONVEYOR GUARDS USING IOT

469 ICCET221168 AGRO DIRECT SELLING APP WITH VOICE BASED CHATBOTS

470 ICCET221151 SIGN LANGUAGE INTO TEXT CONVERTER

471 ICCET220980 E-WASTE CLASSIFICATION AND SORTING USING IOT

472 ICCET221119 SOLAR POWERED POND CLEANING MACHINE


A STUDY ON METHODS AND DEVELOPMENT OF SELF LEARNING PORTAL FOR MATHEMATICS
473 ICCET221081 ENTHUSIASTS

474 ICCET221153 HUMAN-COMPUTER INTEACTION: CONTROLLING MOUSE FUNCTIONALITIES USING HAND GESTURES

475 ICCET221140 RECOGNITION OF WHEAT LEAF DISEASE USING TENSOR FLOW AND KERAS

476 ICCET221247 SMART ONLINE BOOKING SYSTEM THROUGH HAND GESTURE RECOGNITION

477 ICCET221098 ANALYSIS ON ELECTRONIC SKIN


LUNG NODULE MALIGNANCY CLASSIFICATION USING MACHINE LEARNING TECHNIQUE CNN ALGORITHM
478 ICCET221143

479 ICCET221106 DEVELOPMENT OF AUTOMATIC POSTAL PARCEL COLLECTOR WITH PINCODE BASED SEGREGATION
SEGMENTATION AND CLASSIFICATION APPROACH TO IMPROVE BREAST CANCER SCREENING USING
480 ICCET221234 HISTOPATHOLOGICAL IMAGES
481 ICCET221154 SMART SOLAR PANEL CLEANING SYSTEM USING IOT
MUSIC RECOMMENDATION SYSTEM USING SENTIMENT ANALYSIS THROUGH HAAR CASCADE IN
482 ICCET221245 MACHINE LEARNING

483 ICCET221107 FINGER VEIN RECOGNITION BASED ON DEEP NEURAL NETWORK

484 ICCET220808 EFFECTIVE UTILIZATION OF FOOD WASTE AS CONSUMABLE RESOURCES

485 ICCET221226 AN ALTERNATIVE METHOD FOR NON-INVASIVE GLUCOSE DETECTION USING FTIR SPECTROSCOPY
USABILITY STUDY ON VIRTUAL FITNESS APPLICATION USING ARTIFICIAL INTELLIGENCE AND DEEP
486 ICCET221237A LEARNING

487 ICCET221122 ANALYTICAL DEVELOPMENT OF MICRO COMBUSTION CHAMBER

488 ICCET220898 CUSTOMER SALES PREDICTION USING MACHINE LEARNING

489 ICCET221128 A SYSTEMATIC ASSISTANCE FOR FOOD WASTAGE REDUCTION USING MOBILE APPLICATION

490 ICCET221162 LOCALIZATION APPROACH USING BLE AND GSM

491 ICCET221100 A SURVEY ON CHANNEL ESTIMATION IN MMWAVE MASSIVE MIMO SYSTEMS

492 ICCET221076 PERFORMANCE ANALYSIS OF IMAGE RESTORATION FILTERS FOR TEXTUAL IMAGES

493 ICCET221172 PERKSUITY - GET CONTROL AND BENEFITS FOR YOUR DATA

S.NO PAPER ID PAPER TITLE

494 ICCET221156 TRAFFIC SIGN RECOGNITION AND ACCIDENT PRONE ZONE INDICATION IN AUTONOMOUS CAR

495 ICCET221207 INVESTIGATION OF FAULTLESS STRESS LEVEL MONITORING SYSTEM USING ARTIFICIAL ALGORITHMS

496 ICCET221227 EYE MOTION ANALYSIS USING COMPUTATIONAL FLUID DYNAMICS


497 ICCET221210 SMART HOME CONTROL SYSTEM USING MACHINE LEARNING ALGORITHM.

498 ICCET221221 BED FALL DETECTION AND PREDICTION FOR ELDERLY PEOPLE

499 ICCET221238 DEVELOPMENT OF AN AUTOMATIC PATHWAY DIVERTER FOR THE COUNT BASED CONVEYOR BELTS
4D PRINTING USING FUSED DEPOSITION MODELLING MECHANISM FOR SHAPE MEMORY POLYMER:
500 ICCET221170 REVIEW
USING 3D PRINTING TECHNOLOGY FOR PRE-OPERATIVE SURGICAL PLANNING AND TRAINING FOR
501 ICCET221220 OPTICAL NERVE DISEASES

502 ICCET221097 HUMAN ACTIVITY RECOGNITION USING MACHINE LEARNING

503 ICCET220793 ADVANCED HYBRID SOLID PROPELLANT COMPOSITION(S) FOR FUTURISTIC MISSILE TECHNOLOGY

504 ICCET221087 AUTOMATIC PATHWAY DIVERTER FOR CONVEYOR IN PACKING SECTION OF CEMENT FACTORY
TRANSFER LEARNING WITH VGG16 AND RESNET50 FOR LUNG MALIGNANCY CELLS CLASSIFICATION AND
505 ICCET221212 COMPARING ITS PERFORMANCE VIA EVALUATION METRICS.

506 ICCET221205 A REVIEW ON ROBOTIC TECHNOLOGY AND ITS APPLICATIONS

507 ICCET221246 ASSESSMENT OF POST-FIRE CHANGES IN FOREST COVER USING SATELLITE IMAGE PROCESSING

508 ICCET221054 AN ALGORITHM FOR CRIME DETECTION IN DIGITAL FORENSICS

509 ICCET221184 PERSON FALL DETECTION AND HEALTH MONITORING SYSTEM

510 ICCET221009A ATTEMPT TO CLASSIFY TREE SPECIES USING MACHINE LEARNING ALGORITHM WITH SPATIAL DATA

511 ICCET221197 A NOVEL METHOD FOR FAULT DETECTION AND PROTECTION IN SOLAR PHOTO VOLTAIC ARRAYS

512 ICCET221196 BIG DATA ANALYSIS FOR HEART FAILURE: DETECTION, PREVENTION AND PREDICTION
REVIEW: COMPARISON OF PARAMETER ANALYSIS OF RING OSCILLATORS FOR MEASUREMENT OF DELAY
513 ICCET221163 TIME
DIVERSE OBSERVER'S STANPONIT ON THE EXTRATERRESTRIAL INTELLIGENCE - A HYPOTHETICAL
514 ICCET220781 NOTION

515 ICCET221239 AUTOMATIC LUNG SEGMENTATION USING U-NET

516 ICCET221248 BATTERY MANAGEMENT SYSTEM IN ELECTRIC CYCLE

517 ICCET22131 A SURVEY ON EMOTIONAL DETECTION IN DEEP LEARNING

518 ICCET221243 DETECTION OF MAN IN THE MIDDLE ATTACK IN 5G IOT USING MACHINE LEARNING
DIFFERENT LEVEL MULTI MEDIA CONTENT DELIVERY SYSTEM BASED ON ADVANCE WATERMARK
519 ICCET221204 ALGORITHMS

520 ICCET221351 CREDIT CARD FRAUD DETECTION USING DYNAMIC BAYESIAN NETWORK

521 ICCET221195 SIGNATURE AND FORGERY VERIFICATION USING CONVOLUTIONAL NEURAL NETWORK
3D DENTAL PROSTHETIC TOOTH CROWN: DESIGNING AND RE-MODELLING OF CUSTOMIZED TOOTH
522 ICCET221181 CROWN USING ADDITIVE MANUFACTUREING

523 ICCET221291 MONITORING THE TEXTILE WASTE WATER TREATMENT BY USING NATURAL RESOURCES
DEEP LEARNING APPROACH FOR ECG –.BASED HEARTBEAT CLASSIFICATION FOR ARRHYTHMIA
524 ICCET221285 DETECTION

525 ICCET221352 DOCTOR PAITENT APPOINTMENT SYSTEM USING KNN

526 ICCET221263 A PREDICTIVE APPROACH ON STOCKPILE SYSTEM USING ABC ANALYSIS

527 ICCET221213 DEVELOPMENT OF EMBEDDED CUM AI BASED SMART HELMET FOR UNDERGROUND MINERS

528 ICCET221354 CATARACT DETECTION USING DEEP LEARNING

529 ICCET221217 COMPUTER BASED DIAGNOSIS AND CLASSIFICATION OF SKIN DISEASES IN DERMOSCOPIC IMAGES

530 ICCET221158 WOMAN SAFTEY APPLICATION USING GEO- FENCING


531 ICCET221241 CONTROLLING AND MONITORING OF BOILER PARAMETRS USING SCADA

532 ICCET221257 LUNG CANCER DETECTION USING MACHINE LEARNING TECHNIQUES

533 ICCET221358 PRIVACY PRESERVING HEALTHCARE ADMINISTRATION USING BLOCKCHAIN TECHNOLOGY

534 ICCET221277 DESIGN AND ANALYSIS OF COMPACT MICROSTRIP PATCH ANTENNA FOR 5G APPLICATIONS

535 ICCET221151A AUTOMATIC TEXT SUMMARIZER

S.NO PAPER ID PAPER TITLE

536 ICCET221314 SURVEY OF COIN RECOGNITION AND DISCRIMINATORS

537 ICCET221355 A STATE OF ART TECHNOLOGIES IN SMART MASK


REAL-TIME TOMATO LEAF DISEASE CLASSIFICATION USING OPTIMIZED PRETRAINED CNN MODEL BASED
538 ICCET221287 ON TRANSFER LEARNING IN DEEP LEARNING AND PREVENTION STRATEGIES

539 ICCET221178 SMART BAG FOR WOMEN'S SAFETY USING EMBEDDED SYSTEM

540 ICCET221368 PERFORMANCE ANALYSIS OF ENHANCED LIGHTWEIGHT ALGORITHM FOR IOT DEVICES

541 ICCET221276 ECG–BASED HEARTBEAT CLASSIFICATION FOR ARRHYTHMIA DETECTION USING TRANSFORMER MODEL
ON-SITE WASTE MINIMIZATION PRACTICES AND EFFECTIVE QUALITY MANAGEMENT AS A WAY OF
542 ICCET221289 REDUCING ENVIRONMENTAL FOOTPRINT OF THE CONSTRUCTION INDUSTRY: A REVIEW

543 ICCET221269 OBSTACLE AVOIDING ROBOT USING ARDUINO

544 ICCET221284 ARTIFICIAL INTELLIGENCE BASED VOICE ASSISTANT

545 ICCET220670 PRAGMATIC ANALYSIS OF E-COMMERCE SUCCESS FACTORS AND DESIGN ATTRIBUTES

546 ICCET221362 PNEUMONIA DETECTION FROM CHEST X-RAY IMAGES BASED ON CONVOLUTIONAL NEURAL NETWORK
GRID AND RENEWABLE ENERGY SOURCE DRIVEN INDUSTRIAL MOTOR WITH POWER FLOW
547 ICCET221293 MANAGEMENT

548 ICCET221179 CLOUD COMPUTING

549 ICCET221295 ANALYSIS OF A PROJECT COST OVERRUNS AND DELAYS USING RII METHOD
FINITE ELEMENT MODELLING AND SIMULATION OF GLASS FIBRE REINFORCED INDUSTRIAL SAFETY
550 ICCET221357 SHOES USING ANSYS

551 ICCET221363 IDENTIFYING ELECTRICAL FAULT USING MACHINE LEARNING TECHNIQUE

552 ICCET221271 SKIN CANCER DIAGNOSIS USING AI COUPLED WITH IMAGE PROCESSING

553 ICCET221363A ANALYSIS OF ACCURACY RATE IN CREDIT CARD FORGERY

554 ICCET221298 AUTOMATIC CLASSIFICATION OF EVENT RELATED POTENTIAL USING NEURAL NETWORK

555 ICCET221274 STUDY AND ANALYSIS OF VARIOUS CONTROL ALGORITHMS FOR COUPLED TANK SYSTEM

556 ICCET221202 DESIGN OF CRANE BEAM AND GANTRY GIRDER

557 ICCET221199 DESIGN OF CONNECTIONS AND DEVELOPING DESIGN GUIDELINES

558 ICCET221367 ENHANCE DETECTION AND SECURITY IN ATM USING HAAR CASCADE ALGORITHM

559 ICCET221362A A SURVEY ON FLIPPING AND PICK-AND-PLACE MECHANISMS USED IN THEFIELD OF ROBOTICS
EVALUATING THE THERAPEUTIC POTENTIAL AND EFFECTIVENESS OF EXTENDED REALITY EXPOSURE
560 ICCET221251 THERAPY IN THE TREATMENT OF PHOBIAS AND EMOTION REGULATION
INVESTIGATIONS ON THE COUPLED EFFECT OF SPRAY BURNER AND FLUIDIC PARAMETERS ON THE
561 ICCET221364 ONSET OF COMBUSTION INSTABILITY IN SPRACE PROPULSION

562 ICCET221229 DESIGN OF COMPOSITE SLAB IN MULTISTORIED BUILDING

563 ICCET221306 PHOTO VOLTAIC POWER FORECASTING USING REGRESSION ANALYSIS FOR POWER SYSTEMS
564 ICCET221258 ADVANCE HYBRID SOLID PROPELLANT FOR FUTURISTIC MISSILE TECHNOLOGY

565 ICCET221174 DATA MINING AND NEW AGE ELECTIONS

566 ICCET221364A INTELLIGENT CRUTCH TOOL FOR BODY POSTURE MANAGAEMENT SYSTEM USING IOT

567 ICCET221369 PREDICTION OF HOUSE PRICE USING SML TECHNIQUE

568 ICCET221242 MULTI OUTPUT FLY BACK CONVERTER USING SOLAR ENERGY

569 ICCET221367A EOG SIGNALS - A BIOMARKER FOR NEURODEGENERATIVE DISEASES


ON THE STRUCTURE AND DYNAMICS OF LINEAR TIME VARIANT AND NON LINEAR TIME VARIANT
570 ICCET221249 FLAMES

571 ICCET221354A FACE RECOGNITION BASED ATTENDANCE MANAGEMENT SYSTEM IMAGE PROCESSING

572 ICCET221367B COMPARATIVE STUDY OF ENSEMBLE METHODS FOR CLASSIFICATION IN HEALTHCARE DATA

573 ICCET221369A OPTIMIZATION OF VISUAL AND THERMALCOMFORT IN GREEN BUILDING : A REVIEW

574 ICCET221376 ASSISTIVE SYSTEM FOR BLIND PERSON


DENSE RECURRENT NEURAL NETWORK ARCHITECTURE TOWARDS PARTICIPANT PREDICTION FOR
575 ICCET221261 EVOLVING EVENTS IN EVENT BASED SOCIAL NETWORK

576 ICCET221356 ASSESSMENT OF SOIL MOISTURE PROFILE USING SMART REMOTE SENSING AND IOT TECHNIQUES
DESIGN OF VEDIC MULTIPLIER USING QUANTUM DOT CELLULAR AUTOMATA FOR CRYPTOGRAPHIC
577 ICCET221256 APPLICATIONS

S.NO PAPER ID PAPER TITLE

578 ICCET221379 ANALYSIS OF FORENSIC IMAGES DETECTION FOR SUPERIMPOSED OF AN IMAGE AND OTHER IMAGES

579 ICCET221375 ADVERSE DRUG REACTION ANALYSIS USING SUPPORT VECTOR MACHINE MODEL

580 ICCET221382 ARTIFICIAL INTELLIGENCE AND TELEGRAM CHAT-BOT BASED INTELLIGENT AUTHENTICATION SYSTEM
CLOCK BASED TRANSMITTER IDENTIFICATION AND ATTACK RECOGNITION USING INTRUSION
581 ICCET221385 DETECTION

582 ICCET221389 DETECTION OF PROSTATE CANCER USING J48 ALGORITHM

583 ICCET220144 CUSTOMER PERCEPTION TOWARDS ONLINE FOOD BUSNIESS APPS.

584 ICCET221389A SPEECH EMOTION RECOGNITION USING MACHINE LEARNING

585 ICCET221147 FACE MASK DETECTION

586 ICCET221282 QOS ENABLED LOAD BALANCING IN CLOUD USING GREY WOLF OPTIMIZATION ALGORITHM
1 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

1. UWB MICROSTRIP PATCH ANTENNA FOR WIRELESS SENSOR


APPLICATIONS
K.Sugapriya
Research scholar,ECE
Sri Chandrasekharendra
Saraswathi Viswa Maha Vidyalaya
Kanchipuram, India
S.Omkumar
Associate Professor,ECE
Sri Chandrasekharendra
Saraswathi Viswa Maha
Vidyalaya
Kanchipuram, India

In the modern world antenna plays a very vital role in the field of communication, the Ultrawide band
antenna uses many types of wireless sensor applications. The proposed design consist of a circular
microstrip patch antenna with diamond shaped slot is designed using jeans substrate material, it gives
the good sensing in wireless communication at the resonance frequency of 9.5 GHz in the UWB range
3.1GHz to 10.6GHz. The Specific Absorption Rate SAR value of an antenna in the acceptable range,
it can be calculated with the Human Phantom. Hence the proposed UWB antenna gives the good
VSWR, return loss and gain value compared with various UWB designs. the antenna gives good
candidature for wireless sensor applications.

2. MULTILAYER PERCEPTRON ANALYZED THE AUDIENCE PERCEPTION


TOWARDS CITIZENSHIP AMENDMENT ACT-CAA (INDIA)
Mr. M. Shriram1; Dr. S. Arulchelvan2
Department of Media Sciences,
Anna University, Chennai - 600025, Tamil Nadu, India.

This study provides an in-depth analysis of the public perceptions on Citizenship Amendment Act-
(CAA) portrayed in the media. In a multicultural context, the media and their activities are generally
seen as the most important and strategic tool for information flow far the government and
policymakers and their actions and activities. Although the media has a certain influence on public
policy, it is often hard to see how much it magnifies or restricts / censors messages sent to the public
regarding specific policies. The main purpose of this research is to assess the extent of media influence
on various public policies on audiences. This research not only examines the specific cases of the
CAA’s Media Coverage but also seeks to gain publics feedback on the coverage. Furthermore, this
research examines how observers perceived the way media responded and acted on the coverage the
controversial bill -CAA while it was passed in the Parliament. Here this study analyzes the CAA's
media coverage and its impact on audiences. The research further assesses how multilayer perception
is measured and thereby how the media responds to messages that are of public interest to the audience.
Although this study raises a particular issue of audience perception of media coverage in the CAA and
its aftermath which have caused widespread debate in the public sphere. But a limited amount of
research has been conducted on this subject.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
2 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

3. REVIEW OF RESEARCH ON AERODYNAMIC CHARACTERISTICS OF


SUPERCRITICAL AIRFOIL 2414 SERIES FOR TRANSONIC FLIGHT
Dr. P. Booma Devi1, Dr. D. Piriadarshani2, Ms. P. Catherine Victoria3
1Professor, Department of Aeronautical Engineering, Sathyabama University, Tamil Nadu, India
2 Professor, Department of Mathematics, Hindustan University, Tamil Nadu, India
3PhD Scholar Student, Department of Aeronautical Engineering, Sathyabama University, Tamil Nadu, India

Decades of research in shocks and boundary layer interaction of conventional airfoil has yielded many
technical solutions. The primary objective of this review paper is to focus on the early design and
development of supercritical airfoil and its influence on improving lift coefficient, drag reduction and
pressure distribution in high subsonic speed aircraft. The stall effects and buffeting phenomena due to
unsteady flow field are analyzed using the Reynolds average Navier–Stokes equation (RANS). This
paper reviews studies that optimized airfoil shape with increased lift and reduced drag to maximize
its applications in aeronautical and aerospace industries.

4. TEXTILE HORIZONTAL T-SHAPED ULTRAWIDE BAND MICROSTRIP PATCH


ANTENNA FOR WIRELESS BODY AREA NETWORK APPLICATIONS
1K.Sugapriya, 2 S. Omkumar
Research Scholar, Sri Chandrasekharendra Saraswati Viswa Maha Vidyalaya, Kanchipuram,
Tamilnadu, India1,
Asso. Prof. /ECE, Sri Chandrasekharendra Saraswati Viswa Maha Vidyalaya, Kanchipuram,
Tamilnadu, India2,

In wireless body area network WBAN technology, the most common and difficult task is continuous
health monitoring. The proposed design's major goal is to achieve low specific absorption rate SAR
value and to get excellent communication in wireless sensor environment. an antenna is a most
common communicating equipment in the digital era with its unique designs and excellent findings.
The design approach is appropriate to create a new horizontal T-shape slot in a rectangular patch UWB
microstrip patch antenna for wearable applications and the antenna was simulated using a
highfrequency structure simulator utilising a textile material, denim substrate. The designed antenna
resonates at 7.7GHz with acceptable gain of 4dB. Radiation pattern was measured using anechoic
chamber and the antenna gives the good return loss, better bandwidth, a VSWR of 1.05 also the
specific absorption rate SAR value of the UWB antenna is below 2W. The result shows that proposed
design satisfies the requirements for a textile wearable antenna used for continuous health monitoring
in wireless body area network, sports and military applications.

5. INCOMPLETE FUZZY SOFT SETS IN SANCHEZ’S METHOD OF DECISION


MAKING
K. Megala1 and K. Selvakumari2*
1Research Scholar, Department of Mathematics,
2Professor, Department of Mathematics,
1,2Vels Institute of Science, Technology and Advanced Studies, Chennai, Tamilnadu, India .

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
3 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Incomplete fuzzy soft sets is of paramount importance in fuzzy soft sets, where the combination of
incomplete fuzzy soft set and decision-making problem is of great significance. The focus of this paper
to propose an algorithm of fuzzy soft set-based decision- making problems under incomplete
information. To obtain the best feasible solution of these problems, we have to consider various
parameters related to the solution. we apply incomplete fuzzy soft set to deal with decision-making
and propose a Sanchez’s algorithm to make it more accurate and simpler.

6. ON SOLVING FUZZY TRANSPORTATION PROBLEM USING FUZZY ONE


POINT METHOD
T. Benith Sowmya1 and K. Selvakumari2*
1Research Scholar, Department of Mathematics,
2Professor, Department of Mathematics,
1,2Vels Institute of Science, Technology and Advanced Studies, Chennai, Tamilnadu, India.

In this paper a procedure based on fuzzy one point method is proposed to solve fuzzy transportation
problems where the transportation cost, supply and demand are taken s Pentagonal fuzzy numbers.
Numerical Examples are illustrated to demonstrate the proposed approach in detail.

7. CRIME DATA FORECASTING USING MACHINE LEARNING AND BIG DATA


ANALYTICS
R.Brindha1, Dr.M.Thillaikarasi2
1Research Scholar,Dept of CSE,Annamalai University,Chidambaram,Tamilnadu.
2Assistant Professor,Dept of CSE,Annamalai University,Chidambaram,Tamilnadu.

Big data analytics (BDA)” is a system based method with an aim to recognize and examine different
designs, patterns and trends under the big dataset. In this paper, BDA is used to visualize and trends
the prediction where exploratory data analysis examines the crime data.”A successive facts and
patterns have been taken in following cities of California, Washington and Florida by using statistical
analysis and visualization”. The predictive result gives the performance using Keras Prophet Model,
LSTM and neural network models followed by prophet model which are the existing methods used to
find the crime data under BDA technique. But the crime actions increases day by day which is greater
task for the people to overcome the challenging crime activities. Some ignored the essential rate of
influential aspects. To overcome these challenging problems of big data, many studies have been
developed with limited one or two features. “This paper introduces a big data introduces to analyze
the influential aspects about the crime incidents, and examine it on New York City. The proposed
structure relates the dynamic machine learning algorithms and geographical information system (GIS)
to consider the contiguous reasons of crime data. Recursive feature elimination (RFE) is used to select
the optimum characteristic data. Exploitation of gradient boost decision tree (GBDT), logistic
regression (LR), support vector machine (SVM) and artificial neural network (ANN) are related to
develop the optimum data model. Significant impact features were then reviewed by applying GBDT
and GIS”. The experimental results illustrates that GBDT along with GIS model combination can
identify the crime ranking with high performance and accuracy compared to existing method.”

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
4 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

8. APPLICATION OF QUEUEING THEORY FOR THE IMPROVEMENT OF


RAILWAY SERVICES
J.Vasanthi1,S. Santhi2 and K. Selvakumari3

Research Scholar1 , Department of Mathematics

Assistant Professor2 , Department of Mathematics,

Professor3, Department of Mathematics,

1,2,3Vels Institute of Science, Technology and Advanced Studies, Chennai, Tamilnadu.

In most railway stations, the lines of waiting passengers are always very long. The M/M/Z/: FCFS
model is changed into M/M/1/: FCFS in this study to determine which is more efficient, a single line
or several lines. Here, we create an optimization model for queuing and then determine the best model
for queuing. The outcome of analysis was effective and realistic of these factors.

9. APPLICATION OF GENERALIZED FUZZY SOFT SETS IN DECISION MAKING


PROBLEM
V. Renuka1 S. Sandhiya2 and K. Selvakumari3
1Research Scholar, Department of Mathematics,
Vels Institute of Science, Technology and Advanced Studies, Chennai, Tamilnadu, India.
2Assistant Professor, Department of Mathematics,
Vels Institute of Science, Technology and Advanced Studies, Chennai, Tamilnadu, India.
3Professor, Department of Mathematics,
Vels Institute of Science, Technology and Advanced Studies, Chennai, Tamilnadu, India.

Majumder and Samanta initiated the notion of generalized fuzzy soft set and in recent times application
of generalized fuzzy soft sets in solving decision problems is a catching momentum. Generalized fuzzy
soft set theory is a powerful tool for decision making. In our work, an attempt has been made to apply
the concept of generalized fuzzy soft set in student ranking process. Student’s ranking provides a clear
picture to students, parents, teachers and other concerned persons. It creates a healthy competition
among the students. A new technique for students ranking is introduced in this paper based on
generalized fuzzy soft matrix theory.

10. DESIGN OF NOVEL T-FLIP FLOP FOR SYNCHRONOUS COUNTER USING


QUANTUM-DOT CELLULAR AUTOMATA
Dr. G.A.E. Satish Kumar1*, Rafi Naquib2, Pranav Bhargavi3, Dr.T.S.Anandhi4,
1*Professor, Department of E.C.E, Vardhaman College of Engineering, Hyderabad, India,
2Team Lead, Plintron Mobility Solutions, Chennai, Tamil Nadu, India
3Assistant Professor, Sri Venkateswara College of Engineering & Technology, Chittoor, Andhra Pradesh
4Professor, Department of E.I.E, Annamalai University, Chidambaram, Tamil Nadu

The alternate method for the CMOS technology based electronics circuit design with significant
reduction in size is the novel nano scale technology referred as Quantum-dot Cellular Automata
(QCA). Though there are many manipulation circuits, the Arithmetic Logic Unit is a integral
component of the Central Processing Unit to perform the arithmetic and logical calculations. In this
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
5 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

work, a novel T-Flip Flop circuitry is proposed for the design of the synchronous counter with 3 bit
resolutions. The QCAD Designer tool is used to develop the novel T-FF and its utilization in the
counter design. The simulation results exhibits that the proposed QCA design performs effectively.

Keywords: Quantum-dot Cellular Automata (QCA), T-Flip Flop, Digital Counter Circuit.

11. INFLUENCE OF MANAGER’S SUPPORT IN CAREER PLANNING AND


DEVELOPMENT ON CREATING EMPLOYEES’ POSITIVE ATTITUDE TOWARDS
ORGANIZATION.
H Jyothilakshmy; Amrita Vishwa Vidyapeetham, Amritapuri, India
Dr. N Ajith Kumar, Amrita Vishwa Vidyapeetham, Kochi, India

McKinsey’s hot pursuit for talent has triggered diverse studies in talent management. Managing and
retaining talented people have become the greatest challenge for employers. Managers, seen as
superiors as well as the organization’s representative, are the closest link to human assets. As change
makers, managers who nurture a positive culture in an organization, benefit the organization in the
long-term. To bring about positive changes in the organization, we propose that managers’ positive
involvement in career planning and skills training would inculcate a positive attitude towards the
organization and enhance employee development. A systematic probe of IT professionals, using
structural equation model, shows that managers involvement in career planning and employee
development have a sustained effect on fostering positive attitude towards an organization.

12.AN APPLICATION SPECIFIC WEB-BASED DATABASE FOR INSTITUTIONAL


DATA MANAGEMENT SYSTEM

Sini Anna Alex


Computer Science and Engineering
M S Ramaiah Institute Of Technology
Bengaluru, India
Shradha Ravi
Computer Science and Engineering
M S Ramaiah Institute Of Technology
Bengaluru, India
Akash Hegde
Computer Science and Engineering
M S Ramaiah Institute Of Technology
Bengaluru, India
Anita Kanavalli
Computer Science and Engineering
M S Ramaiah Institute Of Technology
Bengaluru, India
D Sanath Kumar
Computer Science and Engineering
M S Ramaiah Institute Of Technology
Bengaluru, India

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
6 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

This Most educational institutes admit thousands of students, yearly, into various programs and
employ faculty who guide and mentor these students. Such institutions require a well-organized and
efficient solution for the management and maintenance of all the information pertaining to them. This
paper elaborates on the database system design that allows for the storage and retrieval of information
of various departments, faculty and students of the college and it also highlights the details of the web
portal created as a user interface for the database. With this system, one can enter large amounts of
data into the database, update it regularly, retrieve and download the data all through the easy to use
and understand web portal. This way all information of the college is digitized, secure and centralized
which enables ease of access to anyone in the college. The database also has various levels of security
so the users can access information only if the related permissions are granted. Such a system can do
away with the unreliable and traditional method of maintaining information on paper while also
keeping the process just as simplified so the burden on the workers are lessened but the quality of the
work remains unhindered.

13. RANKING OF PARABOLIC TRAPEZOIDAL FUZZY NUMBER USING THE


CENTROIDS AND FOCUS
A. Thiruppathi1, C. K. Kirubhashankar2, E.Janaki3
1 Associate professor, Department of Mathematics, Panimalar Institute of Technology
2 Associate professor, Department of Mathematics, Sathyabama Institute of Science and Technology
3 Assistant professor, Department of Mathematics, Panimalar Institute of Technology

Fuzzy set theory has a wide range of application in all fields. Many researchers have developed a
different type of fuzzy numbers and its membership function. The fuzzy membership function attains
the highest value only between the intervals. The fuzzy numbers are parabolic once they obtain the
highest value at the midpoint of an interval and is referred as parabolic fuzzy number. Here a new
ranking of centre of centroids and focus of the parabolic ranking trapezoidal fuzzy numbers has been
developed. So, the parabolic fuzzy number is transformed into a crisp number using new ranking
methods.

14. INSERTION OF TIE –BREAKING MECHANISM FOR FLOW SHOP


SCHEDULING PROBLEM

E.Janaki1 A. Mohamed Ismail2 A.Thiruppathi 3


1 Assistant Professor, Panimalar Institute of Technology, Chennai, India
2 Associate Professor,Sathyabama Institute of Science and Technology, Chennai, 3Associate Professor,
Panimalar Institute of Technology, Chennai, India

This paper deals with Tie –Breaking mechanism applied in NEH technique for four machines and
four job problem in a Flow Shop Scheduling. To obtain a optimal sequence in NEH technique
TieBreaking mechanism plays an vital role. Job sequential order is same for all machines in
Permutation flow-shop scheduling problem(PFSP). The possible number of sequence is (n!)m. Since
the number of machine is four, the problem can be taken as NP-complete. Numerical illustrations are
provided to understand the NEH algorithm easily

15. IOT BASED SOLDIERS MONITORING AND TRACKING IN THE WAR-FIELD


Mrs.G.Shobana, Srivarshinee S T, Tamilselvi P,
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
7 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Department Of Electronics & Communication Engineering,


Mepco Schlenk Engineering College, Sivakasi – 626005, Tamil Nadu, India.

Soldiers are the backbone of our Nation’s protection. They guard us despite any worse situations. But,
nowadays the life of the ones who are guarding us day and night is at stake. One of the crucial
challenges in the military operations is that the soldiers are not able to communicate with the control
station. Herein, a soldiers monitoring and tracking system based on Internet of Things (IoT) is
proposed to monitor and track the soldiers in the war-field. In this proposed system design, PIC
controller (16F877A) is used for sensor interfacing and for communicating with the server unit using
IoT. The main aim of this system is to track the health status like body temperature, heart and blood
oxygen rate of the soldiers and also to monitor the environmental parameters like air quality of the
war-field using wireless sensor network. The proposed system also comprises of a LCD which
displays the normal/abnormal results of the sensors and a keypad which is programmed to send instant
commands like mentioning the necessity of man power and weapons or rescue them in case of
emergency in the war-field. It sends GPS location of the soldiers using IoT Module from soldier unit
to the server unit when there is a variation in the sensors result. The GPS location and the instant
commands are received and displayed in the PC in the server unit. With the utilization of this proposed
hardware, it is possible to execute a system that ensures the safety of soldiers on the war zone.

16. ANN BASED IMAGE SEGMENTATION FOR PHOTOVOLTAIC HOT-SPOT


DETECTION
S.Gayathri Monicka
Professor, Department of EEE
SRM Institute of Science and Technology
Chennai, India
D.Manimegalai
Research Scholar, Department of EEE
SRM Institute of Science and Technology
Chennai, India
M.Karthikeyan
Assistant Professor, Department of EEE
Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College
Chennai, India
Photovoltaic systems have become more popular as people become more interested in developing
energy from renewable resources. Even after the installations, however, there is still a lack of
understanding about the importance of inspecting the condition of the PV modules. To keep the PV
running, early hot-spot detection is required. For detecting hot-spots, thermal imaging is still a popular
technique. This research proposes to develop a method for detecting hot-spots in thermal images of
photovoltaic modules using artificial intelligence techniques. Pre-processing, segmentation with an
Artificial Neural Network and identification are the three main processes. The proposed method
appears to be a good choice for improving hot-spot detection in PV monitoring systems, according to
the results of the experiments.

17. A DISTINCTIVE APPROACH FOR EARLY DETECTION OF PLANT DISEASE


FOR SUSTAINABLE AGRICULTURE

Sivasangari Ayyappan 1, Gnanasekaran Sasikumar 2


ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
8 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

1 Department of Electronics and Communication Engineering, GMR Institute of Technology,


Srikakulam-532127, Andhra Pradesh, India.
2 Department of Mechanical Engineering, GMR Institute of Technology, Srikakulam-532127,
Andhra Pradesh, India

Agriculture has always been the primary resource in producing food. Plant disease has been a major
factor influencing the food production. If there are low yields and less stock of food, and a disease
epidemic occurs then food shortage can easily develop resulting in worst effects on human society.
So, it is essential to deal with the identification of the plant diseases as early as possible to avoid low
crop yield because of diseases. Because of the rapid devel-opment of the Smart Farming, the
identification of the plant disease becomes data driven enabling smart analyses. In this context, Deep
Learning algorithms is used for disease identifi-cation. So, a mathematical model of plant disease
classification and its findings are proposed. The proposed work consist of two layers namely
Preprocessing Layer and Fully Connected Layer (FC). The Pre-processing Layer is for Feature Map
extraction and the Fully Connected Layer is Neural Network. The model is trained using larger dataset
of diseased leaves and healthy leaves and it is tested against random samples. The proposed model
obtained 97% of accuracy in classification and recognition of various plants.

18. A NEW MODEL BASED DESIGN AND PERFORMANCE ANALYSIS OF HIGH


THROUGHPUT AND LOW LATENCY DA-FIR FILTER FOR EFFECTIVE NOISE
REMOVAL IN SDR APPLICATIONS
S. Hari Krishnan, PhD Scholar/ECE, Saveetha School Of Engineering, Chennai, Tamilnadu, India.

Dr.K.Vidhya, Professor/ECE, Saveetha School Of Engineering, Chennai,Tamilnadu,India.

A software-defined radio (SDR) allows for digital communication systems to easily adopt more
sophisticated coding and modulation technologies, which is extremely important in meeting the
everincreasing demands of the wireless communication industry. In this paper, we have analyzed the
Design of Efficiency in FIR filter using faster multiplier and faster adder and verification on Artix-7
FPGA. Design of channel equalizer which is part of the SDR application is applied to FIR for
validation to minimize the BER and Latency, and to improve the throughput. Here, through decimation
factor, frequency response for filter output is changed dynamically without changing filter
coefficients. The High configurable parallel prefix adder can be used to narrow down the worst case
critical path delay during partial product accumulation. The number of LUT’s can be reduced here
based on FIR. The number of coefficients that can access parallel for performing FIR filter operations
can be reduced to reduce delay and memory.

19. TEACHING AID BASED ON CONTEXT ACTIVE CULTURAL BASED STUDY


FOR LEARNING COMPILER DESIGN CONCEPT FOR STUDENTS
Sini Anna Alex
Computer Science and Engineering
M S Ramaiah Institute Of Technology
Bengaluru, India
Anita Kanavalli

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
9 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Computer Science and Engineering


M S Ramaiah Institute Of Technology
Bengaluru, India
Parkavi A
Computer Science and Engineering
M S Ramaiah Institute Of Technology
Bengaluru, India

Context awareness (CA) alludes to frameworks can both sense and respond based on their
environment. We present a complete description of a project for a compiler called Compiler Evaluator
Module (CEM) that generates intermediate representations for each of the phases in the design of a
compiler. A Table driven parsing model for Lexical and Syntax Analysis phase. An annotated parse
tree for a given Syntax Directed Definition using suitable data structures and algorithms. The
syntaxdirected interpretation procedures will be connected to sort checking and intermediate-code era.
The most application is the development of sentence structure trees. Since a few compilers utilize
language structure trees as a middle representation, a common frame of Syntax Directed Definition
turns its input string into a tree. To complete the translation to intermediate code, the compiler may
then make the syntax tree, using another set of rules that are in effect a Syntax Directed Definition on
the syntax tree rather than the parse tree. All these translations are designed through game based
learning [3] for the students with Learning Disabilities like slow learners, hyper active students who
can’t concentrate.

20.ANALYSIS OF KNN, LINEAR, RIDGE, LASSO, POLYNOMIAL REGRESSION


AND SVM ALGORITHMS FOR MAXIMUM ACCURACY TO PREDICTING THE
PRICE OF BITCOIN

Dr.P.A.Selvaraj 1
Associate Professor
Department of Computer Applications
Kongu Engineering College
Perundurai, Erode,
Tamilnadu, India.
Dr. M.Jagadeesan2
Associate Professor
Department of Computer Applications
Kongu Engineering College
Perundurai, Erode,
Tamilnadu, India.
Mr.K.Jayasurya 3
PG Scholar
Department of Computer Applications
Kongu Engineering College
Perundurai, Erode,
Tamilnadu, India.
Ms.K.Karthika 4
PG Scholar
Department of Computer Applications
Kongu Engineering College
Perundurai, Erode,

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
10 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Tamilnadu, India,
Mr.K.P.Rajkumar 5
PG Scholar
Department of Computer Applications
Kongu Engineering College
Perundurai, Erode,
Tamilnadu, India.

Bitcoin has become the most valuable crypto currency in recent years. Bitcoin values, on the other
hand, have been extremely volatile, making them extremely difficult to forecast. As a result, the goal
of this study is to use machine learning linear regression models to train the dataset and then use Grid
Search to find the best scaling parameter and discover the most efficient and accurate model to predict
Bitcoin prices from various machine learning algorithms such as KNN regression, linear regression,
Ridge, Lasso, polynomial regression, and SVM, both simple and with kernels, for predicting the
accuracy of 94 percent of the bitcoin market price.

21. CHARMING SEWERAGE SPECIALIST CARE ARRANGEMENT USING


EMBEDDED SYSTEM

ANITHA MARY.M1, BHARATHY R2, JHANANI SHREE U3, SURENDAR R4


1, 2, 3, 4Assistant Professor (SS)
Department of Electronics and Communication Engineering,
Rajalakshmi Engineering College, Chennai, India

Sewerage system plays an important role to keep the city clean. The traditional Drainage Monitoring
System failed to acknowledge in the field of alerting the people about the gas explosion, increase in
the water level and the opened lid. This system directly impacts on health issues of citizens and worker
who cleans the underground drainage. The proposed system is low cost, less maintenance, long life
and web based real time system, which update the municipal officer by text communication when any
manhole crosses the threshold value. Thus, the proposed system predicting the dangerous situations
in drainage system.

22. HUMAN BRAIN-MOTIVATED MODEL FOR DISTINGUISHING EMOTIONAL


STATES FOR AUTISM DISORDER
Shushma GB1, I Jeena Jacob2
1PhD Scholar, Department of Computer Science, GITAM University, Bengaluru, India
2Department of Computer Science, GITAM University, Bengaluru, India

The machine learning has immense potential to amplify diagnostic and interference research in the
behavioral sciences. It may be instrumental in research involving the highly frequent and varying
syndrome of autism spectrum disorder. However, ML chatbots in the absence of clinical domain
specialists or physicians are questionable and lead to fabricated closures. We conclude with proposed
better practices while using ML in researches related to autism and highlight some up-and-coming
areas for collective work at the intersection of behavioral and computational sciences. As in the recent
years show the growing popularity of chatbots in the absence of the physician in health care industries,
with latest efforts aiming to make them more empathic and humanlike, finding applications, for
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
11 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

example, in health care service or in treating mental illnesses, this proposed chatbot is a human brain
motivated emotional Intelligence.

23. SMART DELIVERY BOX BASED ON TENSORFLOW OBJECT DETECTION


AND RECOGNITION API
Dr.B.Muthusenthil, Dr.V.Dhanakoti , Dr.M.Mayuranathan, T.S.Ramachandran
Associate Professor, CSE
SRM Valliammai Engineering College
Chennai, Tamil Nadu, India

The Object Detection Smart Delivery box operates on raspberry pi with two cameras, one camera that
takes a picture of the delivery person and sends it to the user so that the user can remotely open the
delivery box with the help of an android application. Another camera which is placed inside the box
scans the package, recognizes it with help of “TensorFlow object detection API” and mails the picture
of the package to the user. Receiver module displays the name of the package and tells what package
is delivered. The user can also use Google assistant voice command to open or close the Object
Detection Smart Delivery box.

24. A NOVEL ENSEMBLED DEEP LEARNING MODEL FOR BIOMEDICAL


QUESTION CLASSIFICATION
Tanu Gupta, Ela Kumar
Indira Gandhi Delhi Technical University for Women

The medical question classification is one of the essential steps in building an outstanding ques-tion
answering system for the medical domain. The accurate question classification plays a crucial role in
selecting appropriate documents for answering questions. Due to the competitive nature of deep
learning models in mining deep hidden features, they are popular in accomplishing various NLP tasks.
In this study, we examine the importance of the Temporal CNN (TCN) model in extracting deep
insight features from biomedical questions. A novel deep learning model, Bi-GRU-TCN is proposed
and implemented it for classifying medical question datasets, that blend together the benefits of
BiGRU and TCN. This model not only ex-tract contextual features from the Bi-GRU model, but also
learn spatial features using TCN layers. Comparing our work with the finest deep learning models
with series of experiments, the results show that the proposed model attains an outstanding
performance on biomedical question classification datasets.

25. FORECASTING OF CROP YIELD IN VARIOUS CLIMATIC ZONES OF


KARNATAKA USING PREDICTIVE ANALYTICS

Parkavi A1, Pushpalatha M N2, Sini Anna Alex3, Manasa Manjunatha4


1,3Department of Computer Science and Engineering, M S Ramaiah Institute of Technology, Bengaluru
560054
2 Department of Information Science and Engineering, M S Ramaiah Institute of Technology, Bengaluru -
560054
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
12 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

4Department of Information Science and Engineering, National Institute of Engineering, Mysuru-570008

Agriculture is the most widely practiced occupation in India. It contributes its major share in the
country’s GDP. Most of the times, agriculturists in India do not get the desired crop yield. This is due
to various reasons like government policies, international market policies, limitations of development
and usages of technologies. These reasons influence the results of lesser economic value of the crop.
The advancement of several engineering techniques provide solutions to combat this problem of
obtaining lesser yield. Data analytics is one among such techniques, which is being used as a part of
meticulousness in agriculture; Data analytics consists of powerful set of machine learning algorithms.
It helps in deriving useful information out of the huge data. These enormous data are collected which
aids in making smart decisions. We can use data analytics in the field of Arecanut crop yield prediction
by analyzing the effect of distinct environmental parameters. Some of these parameters are like
rainfall, temperature, humidity, precipitation, soil quality, etc. During various stages of crop growth,
these analysis provides insight on the crop yield. Such insights obtained can provide suggestions to
the agricultural community. This makes them to think scientifically in the direction of crop cultivation.
The current study uses several data analytical techniques in analyzing the Arecanut crop yield in
various climatic zones of Karnataka state in India. In this study the effect of rainfall, temperature,
humidity and soil type parameters are used to predict the Arecanut crop yield by using Multiple Linear
Regression and Random Forest. The prediction was followed by classification in order to analyze the
yield patterns in different climatic zones. The districts of Karnataka are classified into different
climatic zones by using Random Forest and Fuzzy Logic classification algorithms. In this study,
Random Forest gives good accuracy compared to other techniques for predicting Arecanut crop yield
as well as classification of districts into different climatic zones.

26. UN-STRUCTURED MEDICAL DATA DETECTION FOR AUTISM SPECTRUM


DISORDER
Shushma GB1, I Jeena Jacob2
1PhD Scholar, Department of Computer Science, GITAM University, Bengaluru, India
2Department of Computer Science, GITAM University, Bengaluru, India

The Autism spectrum disorder (ASD) is a neural developmental disorder that impairs patients'
capability to perform regular activities like social interaction and communication significantly.
Moreover, the procedure of diagnosing ASD is highly time-consuming, labor-intensive, and demands
extensive expertise. Even though there is no such known cure for ASD, physicians have consent
regarding the importance of early intervention for the diagnosis and recovery of ASD patients.
Therefore, for the benefit of autism patients by improving their access to treatments such as early
intervention, we aim to develop a robust machine learning-based system for autism detection using
Natural Language Processing techniques based on information extracted from medical forms of
potential ASD patients. Our detecting framework includes converting semi-structured and
unstructured medical records data into digital formats representation, preprocessing, learning
document representation, and finally performing appropriate clustering so that it could help the
enduser (Physicians)

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
13 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

27. SIGN LANGUAGE CONVERTER USING FEATURE EXTRACTOR AND


POSENET

Pushpalatha M N1, Parkavi A2, Sachin RS3, Amy S Vadakkan4, Aakifha Khateeb5, Deeksha KP6
1 Assistant Professor, Ramaiah Institute of Technology, Department of Information Science and Engineering,
Bangalore, Karnataka
Associate Professor, Ramaiah Institute of Technology, Department of Computer Science and Engineering,
Bangalore, Karnataka
2Student, Ramaiah Institute of Technology, Department of Information Science and Engineering, Bangalore,
Karnataka
3Student, Ramaiah Institute of Technology, Department of Information Science and Engineering, Bangalore,
Karnataka
4Student, Ramaiah Institute of Technology, Department of Information Science and Engineering, Bangalore,
Karnataka
5Student, Ramaiah Institute of Technology, Department of Information Science and Engineering, Bangalore,
KarnatakaAbstract

Human beings commune with each other to convey thoughts, expressions, experiences and so on to
the people around them. But this case is not the same when it comes to the deaf and mute people. Sign
language paves the way for people with such difficulties to communicate with one another. The aim
of this paper is to facilitate easy and accurate communication between people who have hearing and
speaking disabilities, and those who do not. This paper shows how the communication gap can be
bridged using sign language to text and audio converter with the help of Feature Extractor and Posenet
with an accuracy of 92%. A webcam is used to capture the sign language shown by a person. Posenet
with Artificial Neural Network is used to classify essential words used in day to day life. Various parts
of the body are tracked by the webcam and then converted to text and audio to convey what the person
is trying to express in real time.

28. SMART AND SUSTAINABLE HORTICULTURE USING INTERNET OF THINGS


AND ARTIFICIAL INTELLIGENCE: A QUALITATIVE REVIEW
Prof. Subramanya S. G1, Dr. Parkavi A2
Research Scholar, Visvesvaraya Technological University, Belagavi and Assistant Professor, Dept. of C.S.E1
Nagarjuna College of Engineering & Technology (Affiliated to VTU, Belagavi), Bengaluru, Karnataka, India1
Associate Professor, Dept. of C.S.E, M S Ramaiah Institute of Technology, Bengaluru, Karnataka, India2

Horticulture is a branch of agriculture which deals particularly about growing fruits, nuts, vegetables,
flowers and ornamental plants. It is one of the fastest growing economic sectors and 30% of Indian
Gross Domestic Product (GDP) accounts from horticulture alone making India a second largest
horticulture producer in the world. However, Horticulture crops face many challenges like effective
utilization of land, shortage of labour, shortage of water, low soil fertility, early detection and
treatment of plant disease, pest control, crop monitoring, timely harvesting and yield prediction. In
this paper, we present a qualitative survey to address before mentioned challenges in agriculture as
well as horticulture by using technologies like IoT and AI. We discuss about the application of IoT at
various stages of farming starting from irrigation to crop harvesting and also, about the application of
AI techniques for disease detection, yield prediction etc.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
14 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

29. DENSITY BASED SUPPORT VECTOR MACHINE WITH OUTLIER FILTERS


FOR REAL TIME ANALYSIS OF ROCKS AND STRUCTURES
N. LEO BRIGHT TENNISSON,
Assistant Professor [Sr.G], Department of Computer Science and Engineering,
SRM Valliammai Engineering College, Kattankulathur, Chengalpattu District-603203,

Artificial Intelligence provide effective solution to many real time problems and challenges in the
world. Real Time Analysis of rocks and structures is one of such challenges. Many situations require
gaining the knowledge of rocks or building or iceberg structures. Examples where such analysis
required are mining, rescue operations, sailing of ships, etc…. Structure of rocks / debris / icebergs
are got through advanced imaging system and sensors. This paper introduces application of Artificial
Intelligence algorithm for analyzing and predicting the structure of earth or rock.

30. DESIGN OF 243 LEVEL TRINARY LADDER MULTILEVEL INVERTER USING


VHDL
R.Nithyaa*, Research Scholar, Department of Electronics and Instrumentation Engineering, Annamalai
University, Chidambaram, Tamil Nadu, India.
Dr. T. Anithab, Associate Professor, Department of Electronics and Instrumentation Engineering, Annamalai
University, Chidambaram, Tamil Nadu, India
Dr.M.Arulaalan c,Professor, Department of Electronics and Communication Engineering, C K College of
Engineering & Technology, Cuddalore, Tamil Nadu, India

In this paper, a 243 level Trinary Switched Ladder Multi-level Inverter based on a non-carrier
switching angles algorithm is proposed. The switching angle algorithms generate the triggering angles
for the Digital Pulse Width Modulation signals. The advantage of the non-carries switching angle
algorithm is the precision of the switching signals. The Trinary Switched Ladder Multi-Level Inverter
is a topology that utilizes two wings of DC sources with switch controls for the generation of the
Multi-Level Inverter levels. The 243 –level Trinary Switched Multi-Level Inverter requires 10
switches that split 5 each between the positive wing and negative wing respectively. The 10 switching
patterns are developed using the VHDL code to control the proposed switched ladder Inverter. The
validation of the proposed method is attained by cross-compiling the developed VHDL code in the
MATLAB SIMULINK tool. The parametric analysis namely %THD, Vpeak, Vrms are manipulated
for the proposed 243-level Trinary Switched Ladder Multi-Level Inverter.

31. A TRANSFER LEARNING BASED DCNN FRAMEWORK FOR BRAIN TUMOUR


MULTI-CLASSIFICATION
R. Tamilarasi
Research Scholar
Department of Computer Science,
University of Madras, Chennai-600025

Dr.S. Gopinathan
Department of Computer Science,
University of Madras, Chennai-600025.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
15 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

One of the most frequent diagnoses in neuroradiology is brain tumours. The brain tumours are the
most frequent and most aggressive diseases and their greatest quality of life is quite short. Thus, the
planning of treatments is a vital step in improving patients' quality of life. Improved technology and
machine learning can enhance tumour diagnosis by radiologists without intrusive methods. Nowadays,
Convolutional Neural Networks (CNN) is the most often used algorithm for visual learning and image
recognition. This research seeks to multi-classify brain tumours for early detection by using CNN.
Two distinct CNN models are presented for two classification tasks. The first model of CNN is used
to identify brain tumours with 97.60% accuracy. The other model can classify the brain tumour with
an accuracy of 98% into four tumour kinds such as glioma, normal, meningioma and pituitary. In
addition, the performance of our CNN model was evaluated using 5-fold cross validation technique
and compared with other state-of-the-art models of CNN.

32. PRE-SERVICE EDUCATION: A PRE-REQUISITE FOR THE TEACHERS OF NEW


GENERATION ESL LEARNERS
Dr Jayanthi Rajendran
Professor - Language Training Centre
Saveetha University

Teachers must be equipped with the skills to integrate technology seamlessly into their teaching in
ways that move beyond mere presentation and communication. It is very important that concrete
preparation program for teachers with appropriate technologies and resources would generate an
effective and creative student engagement and learning. The key challenges and solutions to the
effective implementation and integration of technology in teacher preparation program would widen
the arena of opportunities for students learning. Unless and until teachers implement or impart a new
learning methodology towards the competencies of technology education in colleges and universities,
active learning cannot be achieved. Pre-service teaching is an vital acquaintance in the professional
education program. Although college courses, activities, and practices contribute knowledge and
experience to the prospective teacher, pre-service teaching provides the opportunity to experience the
challenging and gratifying task of assuming major teaching responsibilities. This paper will focus on
how pre-service education would enable the teachers to equip themselves to teach the new generation
ESL learners with ideas and technologies that has become the part of our daily life. Digital pedagogy
permits teachers to develop a plan to successfully amalgamate technology into their curriculum of
teaching that would enable learning through formation, innovation and problem-solving. pre-service
educators can create expert teachers, they plan and prepare programs that would be helpful to
assimilate a combination of skills and knowledge mentioned to as (Technological Pedagogical Content
Knowledge). Pre-service teachers with no doubt be able to subsume a firm comprehension and
knowledge of the content matter, a deep understanding of how students learn, and a practice facility
with technology for learning. The preservice teaching experience is designed to provide a controlled
learning situation in which the prospective teacher can put into practice the principles and methods
learned in the pre-service teacher education Program. The eventual goal of the pre-service teacher is
to achieve competency and proficiency in the entry level skills in the teaching profession.

“There’s no doubt technology can enhance education, but only it is in the hands of well-prepared
teachers.” (AT&T, October 31, 1995)

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
16 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

33. PREDICTION OF REAL TIME SOUND USING MACHINE LEARNING FOR THE
HEARING IMPAIRED PEOPLE

S.Veena1, D.John Aravindhar2


1SRM Institute of Science and Technology, Ramapuram, India
2Hindustan Institute of Technology and Science, Padur, India

This paper focuses on aiding the hearing impaired people for their development in the society. Most
of the hearing impaired is caused due to the inner ear or nerve damage. Only a few cases can be
resolved using the Hearing Aid. Hence, we have designed a system that could work for all the sound
impaired people regardless of the case they hold. The main reason behind this is that sound plays a
very important role in everyone’s life. It tells us about the environment, the characteristics of it, about
people, place and move in a way where visuals can’t. To make sure that the Hearing Impaired people
are not isolated with the rest of the world we have proposed to design an IoT based Machine Learning
Sound Classification System that captures sound in Real-Time, processes it and then classifies it using
a trained machine. The machine is trained using the Feature Extraction Techniques and the final result
is given as a push notification to the user. Observations made from the results state that this proposed
system can be used in a deaf school or in a place where there are a group of Hearing Impaired people
so that they are also connected to the happenings of the environment.

34. PREDICTION OF RESPIRATORY DISEASES FROM AUDIO DATA


CAPTURED THROUGH DIGITAL STETHOSCOPE AND SEVERITY ANALYSIS OF
DISEASES.
Soumyadeep Ganguly
Computer Science and Engineering
University of Calcutta
Kolkata, India
Diptakshi Sen
Computer Science and Engineering
University of Calcutta
Kolkata, India
Anil Kumar Gupta
HPC E &I group, C-DAC
C-DAC, Pune
Pune, India
Respiratory diseases are diseases that affect the lungs and other parts of the respiratory system. They
can be severe and can be deadly. In this paper, we have used deep learning models to predict the
disease and analyse the severity of diseases.Thus giving faster detection of disease and its intensity.
The detection of the respiratory diseases was performed on the electronically recorded lung sounds
using a digital stethoscope. The data consist of the respiratory database of 126 patients. The dataset
contains clean respiratory sounds as well as noisy data. The dataset also has 920 annotated recordings
of varying lengths of 10 sec to 90 sec, 6898 respiratory cycles where 1864 crackles,886 wheezes, 506
containing both wheezes and crackles. Several preprocessing steps were introduced to achieve
smoother and less noisy signals. First, the data has been filtered of outliers, and then feature is
extracted from the audio clips namely MFCC, chroma, and mel spectrogram vector. The deep learning
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
17 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

network architecture consists of a Convolutional neural network and recurrent neural network models.
Evaluation of the model was done on the accuracy of the train and test. The developed algorithm has
achieved the highest average accuracy of 94% on tests. This study helps in the detection of diseases
in clinical settings to assist doctors or health workers in decision-making related to the recognition of
respiratory diseases.

35. A Comparative Study on Self-Sovereign Identity powered by the


Blockchain Technology
Sangeetha V1, Shilpa H2, Darshana A Naik3, Shashank M G4 1,2,3,4
Department of Computer Science and Engineering,
M S Ramaiah Institute of Technology, Bangalore, India

The current state of Digital Identity Systems is fractured among service providers. Users must
duplicate their identity information across services, which reduces overall accessibility and increases
the likelihood of privacy breaches. Users have no knowledge of how their data is being misused by
providers and they have little real influence of it. The concept of Self Sovereign Identity (SSI) has
emerged, promising to usher in a new era in which the individual, and only the individual, has
complete autonomy over their identity records, with clear support for a user - controlled data storage
facility. With the introduction of Blockchain technology, the concept of Self – Sovereign Identity has
gained traction, and it is expected to have a significant impact on how internet users communicate in
the future. This paper primarily focuses on several existing Identity Management Systems and shows
how Self Sovereign Identity is better in many aspects when compared to them.

36. CONDUCTION OF ONLINE EXAMINATIONS : A SURVEY


Evangeline D and Parkavi A
M S Ramaiah Institute of Technology, Bangalore,India

Owing to the Covid-19 pandemic, online examinations have been widely conducted across the globe
by educational institutions. Such examinations are proctored manually in many cases. But, eproctoring
tools are also available. Such tools employ Artificial Intelligence, soft biometric traits, emotion
analysis, etc., for monitoring the candidates. There are certain limitations with the use of these e-
proctoring tools. These loopholes permit the candidates taking up the examination to indulge in
impersonation or malpractice of any kind. There are several aspects to be considered during online
exam conduction including authentication, security and evaluation. In this paper, a survey is conducted
on online examination conduction techniques. A comparative study on the advantages, limitations and
scope of such techniques has been discussed in detail.

37. DESIGN OF FUSION DIGITAL PULSE WIDTH MODULATION IN QUANTUM


DOT CELLULAR AUTOMATA
P. Jegadeeshwaria*, Research Scholar, Department of Electronics and Instrumentation Engineering, Annamalai
University, Chidambaram, Tamil Nadu, India

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
18 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Dr. T. Anithab, Associate Professor, Department of Electronics and Instrumentation Engineering, Annamalai
University, Chidambaram, Tamil Nadu, India.
Dr. M.Arulaalanc, Professor, Department of Electronics and Communication Engineering, CK College of
Engineering and Technology, Cuddalore, Tamil Nadu, India

The Quantum Dot Cellular Automata (QCA) is a novel technique in Nano-Electronics based digital
design. The QCA is the best alternate for the CMOS design for its less area occupancy, high
performance and low power consumption. This brief presents the Quantum dot Cellular Automata
design for the fusion Digital Pulse Width Modulation. The proposed fusion Digital Pulse Width
Modulation includes the counter and comparator circuits for the Counter based Digital Pulse Width
Modulation, the ring counter and multiplexer circuits for the Delayline based Digital Pulse Width
Modulation and the combination of CDPWM and DDWPM for the Hybrid based Digital Pulse Width
Modulation. In this work, the resolution is fixed at 23 bits for CDPWM, 22 bits for the DDPWM and
25 for HDPWM. The QCA based fusion Digital Pulse Width Modulation is designed and evaluated
using the QCADesigner Tool. The parametric analysis of the proposed QCA based Fusion DPWM is
compared with the CMOS based design.

38. EMOTIONAL INTELLIGENCE AS A REINFORCER TO ENHANCE


PSYCHOLOGICAL WELLBEING IN THE COVID 19 PANDEMIC.
Dr Rethy B Menon, Vidya Avadhani
Department of Management and Commerce,
Amrita School of Arts and Sciences, Mysuru,
Amrita Vishwa Vidyapeetham, India

COVID-19 pandemic is a severe health disaster affecting multiple countries. Widespread breakouts
have been linked to negative psychological health repercussions. COVID has brought many changes
in the way human beings think and act. Most of the people in the country suffer due to physical health
and mental health issues. It has affected all the age groups and all the sectors. Schools and colleges
have been affected and led to shutting down. Human resources those who are working in the service
sector facing challenges. Due to the mode of work where face-to-face interaction is needed. Employee-
customer contact is the most critical aspect for success in the service industry. Organizations in the
service sector exert ongoing pressure on their staff to perform since front-line employees are
frequently the first point of contact for customers; thus, they must be active, thorough, analytical, and
pleasant. Service organizations like Insurance companies play a significant role in building up a
nation. It contributes in terms of creating huge employment opportunities. This sector has undergone
a lot of changes after globalization. Sales department employees go through a lot of ups and downs
due to heavy targets on them. These Employees in the Insurance sector are under extreme time
pressure to complete tasks. As a result, employees are under much stress and have many emotional
problems. Performance is influenced directly or indirectly. Employees are expected to deliver
exceptional results. Employees must be notable performers to provide these outstanding results in their
job more than usual, resulting in excellent productivity. So, Investigator has attempted to find out the
level of emotional intelligence among the sales department employees of the Insurance sector and
offer suggestions to enhance EI among employees. Data was collected from 612 employees of the
private insurance sector through a structured questionnaire. Data was analyzed using descriptive
statistics-test, ANOVA, and cluster analysis.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
19 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

39. INFRA SOFT Α-OPEN (CLOSED) SETS ON INFRA SOFT TOPOLOGICAL


SPACE

M John Peter1,2,a and R Manoharan3,b


1Assistant Professor, Panimalar Institute of Technology, Chennai-600123, India.
2Research Scholar, Sathyabama Institute of Science and Technology, Chennai-600119, India.
3Associate Professor, Sathyabama Institute of Science and Technology, Chennai-600119, India.

In this article, we define a new soft open (closed) set called infra soft α-open (closed) set and establish
some fundamental properties of this soft open (closed) set. The relation between infra soft αopen
(closed) set and other topological sets are studied. The findings mentioned in this study are preliminary
and serve as an introduction to more advanced research in theoretical and practical areas. AMS
Subject Classifications: 54A40, 54C08, 54C10

40. PREDICTION ON FIELD CROPS YIELD BASED ON TIME SERIES ANALYSIS


DEEP LEARNING MODEL
*S.Iniyan1, R.Jebakumar2, M.Gayathri3
1,2,3
SRM Institute of Science and Technology , Kattankuathur, Chennai 603203.

The agriculture plays a very crucial role within the overall development of the country’s economy.
Climate change, irregular rainfall, change in the nutritional content of the soil and some other
environmental changes have been considered as a serious issue within the agriculture. Using deep
learning models which takes on the various parameters can be considered as an important approach
for achieving an accurate and effective solutions for this drawback. Prediction of the crop yield can
be done by using the yield data of the crop which can be obtain from a historical source which should
have the information like weather, soil nutrient content, soil type, season in which the crop was grown
and its yield. A large dataset containing various parameters would be required in order to train the
model and attain a good accuracy. This paper targets on predicting the yield of a particular crop which
will be supported by the present information using LSTM time series analysis. The information that
is used for building the models was taken from a reliable source thus containing the accurate values.
Also, a lot of models were tested with sample dataset. The prediction of the yield using the advanced
methods can help the farmers to forecast the yield of a particular crop even before cultivating the crop
sown on a piece of agricultural land.

41. ENERGY-EFFICIENT AND BALANCED LOAD ROUTING APPROACH USING


BALD EAGLE SEARCH ALGORITHM FOR PATH CONVERGENCE IN MANET

Venkatasubramanian S
Computer Science and Engineering
Saranathan college of Engineering
Trichy, India
Suhasini A S
Computer Science and Engineering
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
20 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Annamalai University
Chidambaram, India
Vennila C
Electronics and Communication Engineering
Saranathan college of Engineering
Trichy, India

Gomathi K
Computer Science and Engineering
Saranathan college of Engineering
Trichy, India

Mobile Ad hoc Networks (MANETs) are overburdened with stagnant traffic. As a result, the routing
protocol for energy-efficient with load balancing has become an urgent need for MANET, especially
given the limited battery resources in the nodes. Most of the existing routing protocols are
timeconsuming because they consider power at the expense of time and over-routing. An energy-
saving, meta-inference-based load balancing protocol is an alternative model that is more challenging
than traditional routing schemes. Therefore, in this research activity, a meta-inference-based Bald
Eagle Search (BES) approach is developed for an optimal routing protocol for balancing the load in
energy usage. There are three major steps used in the BES, while hunting the fish. Initially, the location
of the vast number of prey is selected by an eagle in the space selection stage; the searching process
of prey is carried out by moving into the selected space during the space search stage. Finally, during
the dive stage, the best point is identified for hunting by swings from the best position that are
determined in the second stage. Therefore, the optimal path is identified by the proposed BES, while
considering the parameters of energy, bandwidth, delay, reliability, and quality. Finally, the proposed
algorithm supports Quality of Services (QoS) and finds the shortest path from one source to the
destination with the lowest power consumption. When analyzing the results based on simulation, the
proposed BES scheme showed a significant improvement in better battery life, less energy
consumption, and high throughput.

42. DDOS ATTACK IN VANET –DETECTION AND PREVENTION


Kalki J
Fourth Year
B.Tech
SRM Institute of Science and Technology
Vijeta Sarkar
Fourth Year
B.Tech
SRM Institute of Science and Technology
Dr. K. Kalaiselvi
Assistant Professor
Department Of Networking and Communications
SRM Institute of Science and Technology

Vehicular conversation networks is a effective device that permits several vehicular information
offerings and programs. The fast boom in automobiles has additionally resulted withinside the
vehicular community turning into heterogeneous, dynamic, and large-scale, making it difficult to
satisfy the stern requirements, along with extraordinarily latency, excessive mobility, pinnacle safety,
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
21 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

and sizable connections of the fifth-era community. Previous research have proven that with the
growth withinside the utility of Software-Defined Networking (SDN) on Vehicular Ad-hoc Network
(VANET) in industries, researchers have exerted widespread efforts to enhance vehicular
communications. This observe offers an exhaustive overview of preceding works with the aid of using
classifying them primarily based totally on primarily based totally on wi-fi conversation, mainly
VANET. First, a concise precis of the VANET shape and SDN controller with layers and information
in their infrastructure is provided. Second, an outline of SDN-VANET programs in distinctive wi-fi
communications, along with the Internet of Things (IoT) and VANET is supplied with attention at the
exam and contrast of SDNVANET works on numerous parameters. This paper additionally highlights
the present day and rising technology with use instances in vehicular networks to deal with the
numerous demanding situations withinside the VANET infrastructure. This survey acts as a catalyst
in elevating the emergent robustness routing protocol, latency, connectivity and safety problems of
destiny SDN-VANET architectures.

43. USE OF CARBON NANO TUBE (CNT) AS A WRAPPING MATERIAL TO THE


BUILDING STRUCTURES TO CONTROL SALT DAMAGE

R.Lilly1 S.Prabhakaran2

1Assistant professor, Department of Naval Architecture and Offshore Engineering, Academy of Maritime
Education and Training (AMET), Chennai, India.

2Professor, Department of Marine Engineering, Academy of Maritime Education and Training (AMET),
Chennai, India.

Salt damage affects the life of the structure significantly. Huge Constructions with higher investments
needs larger life. The Underground metro rail corridor of Chennai constructed along sea coast was
taken as study area which had a greater chance of affected with salts. As a protective measure from
the salt damage, Carbon Nano Tube the Nano material was tested as wrapping material and its
effectiveness in reducing the salt contaminants was found in the laboratory. The sample points are
located on either side of the corridor and sampling was done .The salinity of the water was examined
in the laboratory for the sample points and the water was allowed to pass through the Carbon Nano
Tube. The passed through water was tested again for the salinity levels. Significant reduction of the
salt contaminants was observed during this laboratory investigation. The salinity was identified as a
measure of Electrical Conductivity. Cost of the Nano materials are highly reduced in recent years.
Hence the Nano material founds to be a highly effective solution for the future planet fresh water.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
22 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

44. TRANSIENT RESPONSE ANALYSIS OF PV BASED NON- ISOLATED TWO


PHASE INTERLEAVED BOOST CONVERTER FOR STANDALONE DC
MICROGIRD
M. Kavitha1,V. Meenakshi2,W.Abitha Memala3,C.Bhuavneswari4, M.Pushpavalli5, P.Sivagami6,
S.Nirmalraj7 1-7Department of Electrical and Electronics Engineering, Sathyabama Institute of Science and
Technology, Rajiv Gandhi Salai,, Chennai, Tamil Nadu, India

The renewable energy sources plays a major role in village electrification. PV fed standalone micro
grid suits well for village electrification as grid connected micro grid needs extension of infrastructure
and takes nearly a year to reach the villages. This paper focuses on designing a non-isolated two phase
interleaved boost converter(NI-TPIBC) with Voltage Multiplier Module (VMM) which acts as an
intermediate and promising candidate that connects PV source to the DC load or DC bus. Since PV is
intermittent in nature and produces low voltage, the proposed converter is designed to achieve high
voltage gain with moderate duty cycle. The proposed converter is built to cut down the voltage stress
of the switches and diodes. The leakage energy of the coupled inductor is recycled and the clamp
circuit reduces voltage spikes of the power devices during turn off operation. Further PID controller
and Fuzzy Logic Controller are also used to supply regulated DC bus voltage during different
irradiance level of photovoltaic array and different load variation conditions. The transient response
parameters such as settling time, peak overshoot of the converter is compared for both the controller
and FLC which gives better results.

45. OPTIMIZATATION OF PARTIALLY REPLACEMENT OF NANO – SiO2 WITH


CEMENT
A Jayaraman1, N Sathyakumar2 , S Dhivyabharathi3and J Jeba Jenkin3
1,2,3 Assistant professor, Department of Civil Engineering, Bannari Amman Institute of Technology,
Sathyamangalam, Tamilnadu
4Assistant professor, Department of Civil Engineering, DMI Engineering College, Aralvaimozhy, Tamilnadu

Nowadays, the high strength concrete is develop using nano- materials incorporated by cement. The
nano - materials fill the voids or porous in concrete so that strength and durability are easily has been
achieved. In this paper, the nano-SiO2 materials are partially incorporated into cement and enhance
the strength. The various percentages of nano - SiO2 materials partially incorporated such as 1%, 2%,
3%, 4% and 5% . In this paper, briefly introduced the influence of nano-SiO2 on mechanical and
durability performance of concrete. In addition, this review also includes the micro structure measured
by scanning electron microscope (SEM). The results show that the enhanced compressive strength
and durability of concrete has been achieved, when nano - SiO2 incorporated up to 2% by cement.
The nano - material increased above 2 %, the strength and durability of concrete also reduced. Whan
up to 2 % nano - SiO2 incorporate with cement, the 28 days compressive and tensile strength has been
increased, and also durability performance also good.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
23 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

46. PERSONALIZED RECOMMENDER SYSTEM USING SENTIMENT AND


EMOTION ANALYSIS FROM TWEETS
First A. Swetha Sri T S, Second B. Lekshmi Kalinathan, Third C. Sharon Julia S, Fourth D. Yamuna M
Sri Sivasubramaniya Nadar College of Engineering, Kalvakkam, Tamil Nadu, India

Online social networks provide an arena for people to share their views and perspectives on different
issues and subjects with their friends, family, relatives, etc. It is planned to detect and analyze
sentiment and emotion expressed by people from text in their twitter posts and use them for generating
recommendations. The tweets are collected on a few specific topics and created a data set which is
used to detect sentiment and emotion from them and measure the influence scores of users based on
various user-based parameters. Then the latter information is used to generate generalized and
personalized recommendations for users based on their twitter activity. These recommendations have
a list of users who agreed on the same topic and expressed similar emotions and sentiments towards
that particular topic. Among the three supervised classifiers experimented, SVM provides the best
results for the full text by considering sentiments and emotions.

47. GROUP{1,-1,i,-i}CORDIAL LABELING IN SOME DUPLICATE GRAPHS


R. Jegan1, P. Vijayakumar2
1Associate Professor, Panimalar Engineering College, Chennai
2COE, GIET University, Gunupur, Odisha

We present algorithms in this article and demonstrate the existence of Group{1,-1,i,-i} Cordial
Labeling in the extended duplicate graphs of complete bipartite, quadrilateral snake, alternate
quadrilateral snake and duplicate graph of complete graph with even vertices, triangular snake,
alternate triangular snake .

48. MODELING OF FILTERS FOR GRID CONNECTED VOLTAGE SOURCE


INVERTER USED IN RENEWABLE ENERGY RESOURCES
V.Meenakshi
Department of EEE
Sathyabama Institute of Science and
Technology
Chennai ,India

C.Bhuvaneswari
Department of EEE
Sathyabama Institute of Science and
Technology
Chennai ,India

M.Kavitha
Department of EEE
Sathyabama Institute of Science and

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
24 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Technology
Chennai ,India

W.Abitha Memala
Department of EEE
Sathyabama Institute of Science and
Technology
Chennai ,India

V.Vijeya kaveri
Department of CSE
Sri Krishna college of Engineering and
Technology
Coimbatore- INDIA

D.Godwin Immanuel
Department of EEE
Sathyabama Institute of Science and
Technology
Chennai ,India

Among the non-conventional energy sources, it is much beneficiary and mandate to utilize wind
energy for the development of decentralized integrated energy systems in conjunction with solar
energy, hydel energy and biomass etc., Wind turbines do not launch emission which can pollute air or
water and water is not at all needed for the cooling system used in it. The quantity of carbon dioxide
emissions, amount of green-house gases is remarkably reduced. Wind power is suggested for a
prolonged usage while problems like oil shortages and environmental effects etc., arises in the power
market. In view of small scale energy manufacturing system, Permanent Magnet Synchronous
Generator (PMSG) is appropriate considering its cost and simple operation, while for large scale,
Doubly Fed Induction Generator (DFIG) is preferred . In this paper the filter design along with its
mathematical expressions to validate the design details both in analytical and experimental manner is
discussed. The transfer function of LCL filter in grid side is found out and the consequent frequency
domain approach using Bode plot has been presented. The total harmonic distortion with reduced
ripple component is observed in the grid current for LCL filter and design parameter for LCL filter is
done.

49. SEISMIC ANALYSIS STEEL TRUSS BRIDGE USING SPLICES CONNECTION


A Jayaraman 1, J Jeba Jenkin2, M Saravaman3, K Sreelaksmi4
1 Assistant professor, Department of Civil Engineering, Bannari Amman Institute of Technology,
Sathyamangalam, India
2Assistant professor, Department of Civil Engineering, DMI Engineering College, Aralvaimozhy, Tamilnadu,
India
3Associate professor, Department of Civil Engineering, Marri Laxman Reddy Institute of technology and
management, Dundigal, Hyderabad, India
4 Students, Department of Civil Engineering, Bannari Amman Institute of Technology, Sathyamangalam, India

The aim of the research project is to resist the seismic force/ vibration force in railway steel truss
bridges using splice connection. Using the Warren type of railway truss bridges Analysis and designed
by Indian standard railway code (IRC) and IS 800 -2007. The connection of the railway truss bridge
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
25 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

is bolted with splice connection. Same cross sectional area has been carried for both theoretical and
experimental investigation. Observed from the results, the splice connection has high load carrying
capacity, low deflection and high level seismic resistance.

50. RECURRENCE OF GENERALIZED LIMITING RATIO RELATIONS


R. Balaji 1,* , B. Antline Nisha 2, M. John Peter 3, SP. Ranganathan 4 , V. Kamalakannan 5
1. Department of Mathematics, Panimalar Institute of Technology,
Chennai 600123, Tamil Nadu, India. E. Mail: [email protected]
2. Department of Mathematics, St. Joseph’s Institute of Technology,
Chennai-600119, Tamil Nadu, India. E. Mail: [email protected]
3. Department of Mathematics, Panimalar Institute of Technology,
Chennai 600123, Tamil Nadu, India. E. Mail: [email protected].
4. Department of Mathematics, Surya Group of Institutions,
Vikravandi-605652, Tamil Nadu, India. E. Mail:[email protected]
5. Department of Mathematics, Panimalar Engineering College,
Chennai-600123, Tamil Nadu, India. E. Mail: [email protected]
*Corresponding author: R. Balaji

Progression of a distinct behavioral examination is studied using continued process. Continued process
is mostly multidimensional array to previous terms using recursion, in this continued process with the
nth term is straight line. Among them, in a sequence or a multidimensional array to previous terms
using recursion with constant coefficients and linear recurrences with polynomial coefficients are very
much important. Continued process results are generally straight-line recurrences, in this nth term
would be straight line regarding to its previous terms. Objective of this paper is finding the fraction of
f term to term and it’s known as mean ratio. Continued process is applied step-by-step for a common
sequence to determining a précised iterative relation and mean ratio. By characterizing graphs, we can
easily understand exact results obtained which is nearest to 2 on either side of progression. Closest
point of progression when, m=18 the result obtained is 1.9999 and then when, m=19 the result obtained
is 2.0001.

51. A RELIABLE DATA TRANSMISSION USING AN ADAPTIVE ROUTING


PROTOCOL FOR FANETS
Orchu Aruna1, Dr. Amit Sharma2

1Assistant Professor, Department of Computer Science and Engineering, Narasaraopeta Engineering


College, AP, India.

2Associate Professor, Department of Computer Science and Engineering, Lovely Professional


University, Punjab, India.

This paper converses instigating UAVs for several civilian and armed zones by generating FANETs
as modern solicitations comprise slightly floating nodes. Flexible, consistent, and delay-bounded
infrastructures among UAVs are essential in FANETs due to the quickly altering topology and
augmented quantity of UAVs by continuing the anticipated system with eminence facilities. Data
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
26 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

transmitting between UAVs is a key challenge in FANET, because FANET is not similar to the
MANETs with the limitations of less convenience and high mobility. The dynamic updating of routing
tables should achieve as indicated by topology changes. To afford a reliable communication between
UAVs, metric controls have not measured by maximum number of current routing procedures in
FANET. Due to the sophisticated movement of FANETs, the actual challenge is the routes
consistency. In this research work, we have introduced a new routing system, a predicted future
weight-based routing scheme for FANETs that considers the node's present and upcoming values of
detailed parameters for the reliable routing. This proposed routing procedure allocates weight to every
node in the network by calculating the node's future. Depending on this process, the connecting nodes
can found a reliable path that continues for a long time. This dynamic future prediction-based routing
scheme ensures better data delivery with minimum overhead and optimized energy consumption in
all conditions than traditional routing protocols. The proposed routing protocol could achieve better
results than other routing protocols based on the valuation of simulation results.

52. STUDIES ON PREPARATION OF SQUASH FROM COCONUT SPROUT

Nithiya priya.B.T*, Jei Subhashini V, Vidhya Lakshmi J, Kundavaidevi K, Ragavi V J


Dept. of Food processing and preservation technology, School of engineering,
Avinashilingam Institute for Home Science and Higher Education for women, Coimbatore,
Tamil Nadu, India.

Squash is a non-alcoholic beverage that has 7g of fiber, 89% saturated fat, 150 ml of coconut sprout
extract, and 150 ml of tender coconut water it also includes two ml of ginger, 2ml of lemon, and 0.1
ml of sodium benzoate. Before serving, it is diluted. Coconut sprout squash is indeed a naturally
highenergy drink that is quite nutritious. Coconuts are still one of the world's most significant crops,
they are grown in tropical countries like India. Tender coconut is a plentiful and naturally occurring
resource that is utilized as a meal and beverage. The goal of this study was to construct a squash with
coconut sprout extract, tender coconut water, lemon juice, and ginger juice. To determine the most
appropriate boiling methodology for generating coconut sprout squash and to assess the overall
acceptability of squash in prepared sample A. In comparison to sweet orange squash, sample A had
the highest squash score. In comparison to sweet orange squash. Sample A had the greatest protein
and carbohydrate score. The sample had the highest overall acceptance. The prepared sample is placed
in a glass bottle and air-cooled separately on wooden planks. In physicochemical and sensory
evaluation, sample A was preferable. The samples are tested for proximity and microbiological
contamination. The formulated coconut sprout squash contains a significant level of Omega 3 fatty
acid, making it ideal for people with colorectal cancer and high blood pressure.

53. ENHANCEMENT OF REJECTION CHARACTERISTICS OF FILTER USING AN


ARRAY OF CSRR FOR NOTCHING THE ISM BAND IN UWB ANTENNAS

M. SATHISH1 S. ANITHA2 R. BHARATHY3 U. JHANANI SHREE3 M. ANITHAMARY3


1ASSISTANT PROFESSOR (SG), 3ASSISTANT PROFESSOR (SS)
13 DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
13RAJALAKSHMI ENGINEERING COLLEGE, CHENNAI, INDIA

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
27 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

This proposed work uses Complementary Split Ring Resonator (CSRR) to filter out the frequency
bands. It is evident that any planar antenna will radiate in its resonant frequency as well as other
frequencies. Those harmonics need to be eliminated from the radiation characteristics to have effective
radiation. This filter is designed for 2.5GHz to remove those undesirable harmonics and hence a band
elimination filter is approached using square and hexagonal ring configuration.

54. WIRELESS POWER TRANSFER SYSTEM WITH IMPROVED COIL GEOMETRY


Anbuselvi Mathivanan and Saravanan Palani
Sri Sivasubramaniya Nadar college of Engineering, Tamilnadu, India

This research work focuses on the design and development of the wireless charging system for electric
vehicles. The research components of the work include the design of a compensation circuit and
coupling coil geometrical analysis for maximizing the power transfer efficiency. The preliminary
work on the compensation circuit, involved the design of LCCC-LCC, unbalanced series-series
topology. The parameters of the circuit components are optimized under simulation environment and
it is experimentally validated with the real-time implementation of the proposed circuit. The coupling
coil used in the wireless charging system has a prevalent impact on the efficiency of power transfer.
The work spans across the three different geometrical designs of circular coils and analysis of the
same under the developed experimental design. The analysis of the proposed system is extended
towards the understanding of varied coupling factor and coil dimensions. The outcome of the analysis
attains an optimized wireless charging system with improved efficiency and reduced design
complications

55. ARTIFICIAL NEURAL NETWORKS AND PI HYBRID CONTROLLERS FOR AN


ELECTRIC VEHICLE'S ENERGY STORAGE SYSTEM
Swagata Banerjee1, S Shiva Kumar2. Bit Mesra,

Techniques for designing an Electric Vehicle Hybrid Energy Storage System are being considered.
As a result of the increased demand for electricity, there must be greater monitoring and more
frequent regulation, and there must be more difficulties overcome in the creation and refining of
specialised techniques to meet it. Projects to reduce energy consumption in the construction,
transportation, commerce, and other activities are examples of such initiatives. Computer and
smartphone-based entertainment, basically portable PCs, is becoming more popular. This difference
must be made between the capacity to store energy utilising renewable resources for lengthy periods
of time and the technology for minimising energy use. A great amount of study and investigation is
required as a consequence of the nature and scope of this subject matter. An in-depth grasp of the
significance of electric automobiles for hybrid energy storage systems would be incorporated in a
more focused comprehension of their respective points of view. PI and neural networks are
employed in this thesis to create improved distortion-free outputs using a unique technique based on
neural networks and PI.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
28 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

56. A SHORT REVIEW ON BATTERY MANAGEMENT SYSTEM FOR ELECTRIC


VEHICLE
Yasvanthkumar Sundaram1, Dr.Sivanandan Nanjan2, *
1ResearchScholar, Department of Electronics, PSG College of arts and Science, Coimbatore-641014,
Tamilnadu, India.
2 Assistant Professor, Department of Electronics, PSG College of arts and Science, Coimbatore-641014,
Tamilnadu, India .

Background: Rechargeable batteries have become a key renewable energy source for various
applications such as transport, grid storage and mobile systems in recent years. Much more powerful
batteries and the introduction of electric cars with a greater performance than fossil fuel cars were
accomplished by the advancement of power storage technology. Despite of the relative maturity of
batteries, the academic industry and businesses are working hard to make vehicle electrification
batteries safe and affordable. Methods: A battery test commonly used for charge and discharge
constant voltage, Current and constant exile electric mode, record the process of testing data, such as
testing time, voltage and current. The electrochemical performance parameters characterization of
material capacity, columbic efficiency, charging and discharging platform and battery internal
parameters. The battery management system (BMS) is a critical component of electric and hybrid
electric vehicles. Findings: The purpose of the BMS is to guarantee safe and reliable battery operation.
It is used to improve the battery performance with proper safety measures within a system. Therefore,
a best BMS is that must need for operating an electrical system. Novelty: This paper reviews the
characteristic of battery management system and its technology with advantages and disadvantages.
Also, aims to analyzing this battery management system in detail

Keyword: Battery, Battery Management System, energy storage safety, electric vehicle.

57. CUSTOMER PERCEPTION TOWARDS ONLINE FOOD BUSINESS APPS


1Dr.P. Vanitha2Priya R 3Gokul R4Arunika5Naveen C6Arulmurugan
1Associate Professor, Department of Management Studies, M. Kumarasamy College of Engineering, Karur,
Tamil Nadu, India.
E-Mail: [email protected]
2 Students, First Year MBA, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, India.
3,4,5,6 Student Second Year MBA, M. Kumarasamy College of Engineering, Karur, Tamil Nadu, India.

The main aim of this research is to examine the consumer perception towards online food business
apps and to analyze the perception towards quality of apps and websites of electronic food ordering
companies among the respondents in Karur district .Both primary and secondary data has been used
to collect the information. Technology Acceptance Model questionnaire model has been used to
collect the data. Sample Size is 120.Kruskal Wallis test has been used to find the relationship between
variables.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
29 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

58. RECOGNITION OF TRAFFIC INFORMATION WITH THE HELP OF SOCIAL


MEDIA TWEETS
Dr. Cuddapah Anitha, Associate Professor, Department of Computer Science and Systems
Engineering, SreeVidyanikethan Engineering College (Autonomous), Andhra Pradesh, India

Dr. C. Sivakumar, Asst.Professor, Department of Computer Science and Systems Engineering,


SreeVidyanikethan Engineering College (Autonomous), Andhra Pradesh, India

In present era, social media is been evolving widely in terms of using for connecting to their friends
and beloved one’s, posting and sharing the information. Few social Medias like, Face book, LinkedIn,
twitter was also using for sharing the ongoing daily trends in the real world. In metro cities like
Bangalore, Chennai, Delhi Mumbai and Hyderabad are well known to their traffics, people are
struggling to reach their destination on time. In our paper, we were focusing on detecting the traffic
information from social media text to make sure traveler reach their destination or places with a short
time or quick. Also, we were focused to provide the necessary safely precaution on the road accident
on their go. The main advantage is to increase the accuracy of traffic event and to display the location
information of huge traffic. In this paper, we used the Logistic Regression method is used to extract
the real-time traffic information which is also compared with combination of CNN-LSTM Method.

59. OPTIMAL BIDIRECTIONAL LONG SHORT TERM MEMORY BASED


SENTIMENT ANALYSIS WITH SARCASM DETECTION AND CLASSIFICATION
ON TWITTER DATA
M. Jeyakarthic1, Assistant Professor, Department of Computer and Information science, Annamalai
University, Chidambaram.

J. Senthilkumar2, Assistant Professor, Department of Computer and Information science, Annamalai


University, Chidambaram

Sentiment analysis (SA) and sarcasm detection on social networking platforms have gained significant
attention in recent times. The existence of sarcasm in social networking data like Twitter is a major
cause of wrong categorization of sentiments. It remains a challenging issue in natural language
processing (NLP) as it restricts the way of identifying the original sentiment of the people. Different
feature engineering approaches are available in the literature to detect the presence of sarcasm in
Twitter data. This study develops an Optimal Bidirectional Long Short Term Memory based Sarcasm
Detection and Classification (OBiLSTM-SDC) using Twitter Data. The goal of the OBiLSTM-SDC
technique is to identify and classify the existence of sarcasm in social networking data. The
OBiLSTM-SDC technique involves term frequency-inverse document frequency (TF-IDF) model for
feature vector generation. In addition, the BiLSTM model is employed for the classification of sarcasm
and the hyperparameter tuning of the BiLSTM model takes place by the use of chicken swarm
optimization (CSO) algorithm. The performance validation of the OBiLSTM-SDC technique takes
place on benchmark dataset and the results are inspected under various aspects. The simulation results
highlighted the supremacy of the OBiLSTM-SDC technique over the recent approaches.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
30 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

60. IoT BASED DECISION SUPPORT SYSTEM FOR TELEHEALTH MANAGEMENT


THROUGH DATA MINING FOR BIOMEDICAL EQUIPMENT
1st Dr.S.Rajalaxmi
Dept.of Biomedical Engineering
Mahendra College of Engineering
Salem, India
2nd G.Shyamala
Dept.of Biomedical Engineering
Mahendra College of Engineering
Salem , India
3rd R.Priyadharshini
Dept.of Biomedical Engineering
Mahendra College of Engineering
Salem, India

Often, small clinics and hospitals using previous generation of Medical equipment do not have facility
to transfer patient data to a remote location for analysis. As the ratio of doctors to patients is declining
due to rise in health care issues, it is necessary to monitor patient data from a remote location, where
qualified medical professionals are available. India counts to 1,85,505 Primary Health Centres in rural
villages alone with approximately 371 crore worth medical equipment. Due to the cost ratio, the entire
equipment replacement with modern technology would be myth. Rather, implementation of add-on
equipment with the existing equipment will help provoke of a decision support system for telehealth
enhancement. The proposed work includes a clip on camera supported with IoT to capture the screen
continuously and transfer the data wirelessly to remote location. This will be a small add-on camera
to every equipment. It is a portable, small clip on device which can be added to any biomedical
equipment by clipping on it to the display monitors. The work proposes a system that consists of a
camera that can be clipped onto the screen of the existing equipment and a data processing module
and a data transmission module. The receiving end will be a wireless receiver module and a translator
and display capable of receiving from multiple equipment. The development of camera based medical
equipment is very helpful in the hospitals located in the rural areas. It includes data extraction, data
storage and data visualization. This works under the basis of Optical Character Recognition and
Application Programming Interface in Google Cloud Platform. This proposed work would be useful
for patients in need of diagnosis and treatment who are remote from the doctors and using the existing
older generation biomedical equipment itself.

61. EFFECT OF SURFACE ROUGHNESS ON THE AERODYNAMIC AND


AEROACOUSTIC PERFORMANCE OF THE DARRIEUS WIND TURBINE
A.Sasi1, J.Gunnal2, T.J.Ramkumar3, K.Karthik4,J. Sarathkumar Sebastin5

1,2,3,4,5Department of Aeronautical Engineering, Kalasalingam Academy of Research and Education,


Sirivilliputhur, Tamil Nadu.

. The recent advancements in small wind turbines show an increased demand for the Darrieus wind
turbine in the urban environment. The present work is devoted to the numerical analysis of the
aeroacoustic sound emission from a straight bladed Darrieus wind turbine with NACA0018.
Computations are performed at Reynolds number of 28,000 with a tip speed ratio of 0.4 using the
unsteady Reynolds averaged Navier Stokes equations with Ffowcs Williams- Hawking's (FW-H)
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
31 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

acoustic analogy. The FW-H method is based on a free field Green's function where the scheme uses
a porous integration surface and implements an advanced time formulation. The study aims to obtain
a numerical methodology to predict the effect of surface roughness on wind turbines' aerodynamic
power and sound emission.

62. PCOD PREDICT FOR OBESE PATIENT USING NAFLD AND T2D PROFILES
H.Kala, K.Sharmila, A.T.Priyeshkumar
Dept.of Biomedical Engineering
Mahendra College of Engineering
Salem, India

PCOD is the major problem faced by women in now-a days which is caused by increasing the male
androgen level and cause heavy bleeding, infertility and cause severe effects like diabetes also.. For
that an indigenous device has been designed for detection of Polycystic ovarian disease based on
measurement of the volatiles in the Exhaled Breath. This device useful in clinical field. The sensing
unit is based on the two commercial sensors of MQ136-Hydrogen sulphide and MQ3-Alcohol sensor
which are sense the VOCs of Hydrogen sulphide and Ethanol contained in the human Exhaled Breath.
The patient samples of Exhaled breath to be blowing through inhalation tube, a mouthpiece is to be
linked with patient mouth for blowing. We have designed and tested this device with two different
types of patients between obese patient with PCOD and Lean patient without PCOD. This device can
differentiate the with PCOD and without PCOD patients for predicting the PCOD patient correctly by
analyzing the VOCs of NAFLD and T2D because the NAFLD and T2D are the major influences for
getting PCOD, particularly in obese patient. With further developments and measurements gives the
hope which this system will become as useful device in clinical purpose for screening the PCOD
problem at easiest way, in Non-invasive method than invasive method in future. Such that this device
will be reduce the usage of invasive method, patient discomfortness and cost.

63. NETWORK SECURITY ATTACKS & TECHNIQUES TO SECURE THE


NETWORKS.
Bhagwant Singh1 Dr. Sikander Singh Cheema2
Punjabi University Patiala
Department of Computer Science and Engineering

Network safety is a procedure utilized to ensure the client’s classified Intel and shield from online
cheats and frauds. Network protection gives a safe space for the clients to get to their Intel safely. In
this paper, the author breaks down bunches of escape clauses that threaten digital protection,
prompting network assaults. This paper additionally discusses distinctive organization security
methods. The network safety strikethrough has sought me to explore this space. The information and
secret data of different organizations are in grave danger, so this exploration is an endeavour to give
a rampart with the goal that no intruder can encroach and strikethrough data. It is an endeavour to plug
all escape clauses to give a superior and dependable organization. While more businesses suffer severe
security breaches, the amount of data that has been exposed is increasing. According to data breach
stats, hackers are motivated by money to obtain data, and private information is valuable to infiltrate.
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
32 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

It’s also clear that businesses are still unprepared even though data breaches are becoming more
regular. In today’s environment, network security flaws are the most frequent dangers and difficulties.
The justification for this is that everything and everyone is connected to the Internet. That implies
there’s a chance the technology may be hacked, but there’s also a chance it won’t. There are some
manufacturing deficiencies, and sometimes, while designing a product, the developer is left with a
loophole or backdoor in the product; the product can be anything; for illustration, when an ISO image
is configured in hardware, there is a possibility that certain backdoors and loopholes stay, which may
impact clients or associations in the long term. There are numerous methods for this sort of incident,
and when we implement specific strategies. Some of the strategies provided by the author in this paper
demonstrate how to discover issues and implement specific techniques to make their network more
secure and robust.

64. METHODS FOR RESTRICTING UNWANTED ACCESS ON THE NETWORKS


USING FIREWALL
Bhagwant Singh1 Dr. Sikander Singh Cheema2
Punjabi University Patiala
Department of Computer Science and Engineering

This paper examines firewall mechanisms routinely implemented for network security in depth. A
firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds
of infrastructure are employed to establish a secure network. Firewall strategies have already been the
subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by
combining capability of the firewall of the use of additional firewall mechanisms which including
packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall
potential and combined approaches, but there aren't many. The research team's goal is to build a safe
network by integrating firewall strength and firewall methods. The study's findings indicate that the
recommended concept can form a reliable network. This study examines the characteristics of network
security and the primary danger, synthesises existing domestic and foreign firewall technologies, and
discusses the theories, benefits, and disadvantages of different firewalls. Through a synthesis and
comparison of various techniques, as well as an in-depth examination of the primary factors that affect
firewall effectiveness, this study investigated firewall technology's current application in computer
network security, then introduced a new technique named "tight coupling firewall." Eventually, the
article discusses the current state of firewall technology as well as the direction in which it is
developing.

65. COMBINING DATA OWNER- SIDE AND CLOUD-SIDE ACCESS CONTROL IN


ATTRIBUTE BASED ENCRYPTED CLOUD STORAGE

Balasundar V1* , Zeus Kevin Anderson S2* , Dinesh S 3, M.Manimegalai 4 , K.


Sebasthirani5 1Under Graduate, Information Technology, National Engineering College,
Kovilpatti. 2Under Graduate, Information Technology, National Engineering College,
Kovilpatti. 3Under Graduate, Information Technology, National Engineering College,
Kovilpatti.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
33 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

4Assistant Professor,Information Technology,National Engineering College, kovilpatti,


5Associate Professor, Electrical and Electronics Engineering, Sri Ramakrishna Engineering College,
Coimbatore

Due to the lack of user-to-cloud controllability, people endorse the benefits of cloud computing, but
are hesitant to trust cloud providers with private information. Owners of data outsource encrypted data
rather than plaintext in order to ensure confidentiality. CP-ABE (cypher text-policy attribute-based
encryption) can be used to conduct fine-grained and user-centric access control when sharing
encrypted data with others. However, this isn't sufficiently secure from other attacks. Previous
schemes did not allow cloud providers to verify whether a downloader could decrypt data. As a result,
all users should have access to the files. To launch economic denial of service (EDoS) attacks,
malicious attackers can download thousands of files, consuming much of the cloud's resources. Users
pay for these resources. A cloud provider is both an accountant and a payee for resource consumption,
which leaves data owners in the dark. These concerns must be supervised in cloud applications in the
real world. The project proposed a method for securing encrypted cloud storage from EDoS attacks
and providing resource usage reporting. By using CP-ABE schemes in a black-box manner, it
complies with the arbitrary access policy of the CP-ABE. Two protocols are presented for different
settings, and performance and security analyses are presented.

66. TRIPLE BAND U-SLOT ULTRA-WIDEBAND ANTENNA AS A WIRELESS


SENSOR FOR COMMUNICATION
1K.Sugapriya, 2 S. Omkumar

Research Scholar, SCSVMV, Kanchipuram, Tamilnadu, India1,

Asso. Prof. /ECE, SCSVMV, Kanchipuram, Tamilnadu, India2,

The communication industry involves in all the digital environment in the world, the Ultra-wide band
Microstrip patch antenna plays a vital role, because the patch antenna consists of compact size, less
weight, better return loss and good radiation pattern. The proposed U-slot ultra-wide band antenna
was designed for wireless sensor applications and it operates in triple band frequencies of spectrum
sensing function for three different applications. The antenna is designed using the FR4 substrate
material with reference to the ground plane, the U-slot is etched from the rectangular patch to get the
good wireless sensing, triple frequency band operation for spectrum sensing and it gives the good
return loss i.e., below 10dB in negative, gives the Omni directional radiation pattern in the ultra-wide
band range 3.1GHz to 10.6GHz also to achieve a good gain, hence the ultra-wide band antenna is
suitable for triple band application like cognitive radio, satellite, radio navigation etc.,

67. MESH MESSAGING SERVICE USING BLUETOOTH


Aswini.J
Computer Science and Engineering
Sree Vidyanikethan Engineering College
Tirupati, India
P. Ruchitha
Computer Science and Engineering
Sree Vidyanikethan Engineering College
Tirupati, India
P. Hitesh Reddy
Computer Science and Engineering
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
34 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Sree Vidyanikethan Engineering College


Tirupati, India
P. Ashish
Computer Science and Engineering
Sree Vidyanikethan Engineering College
Tirupati, India
R.B.Moulya
Computer Science and Engineering
Sree Vidyanikethan Engineering College
Tirupati, India
S.Amisha
Computer Science and Engineering
Sree Vidyanikethan Engineering College
Tirupati, India

The idea is to create a service that enables users to communicate with other users using a Mesh
Network established between their devices. The Mesh network is to be built using the Bluetooth
service available in the user devices. There are apps built using this technology such as Bridgefy,
Mesh Messaging, Fire chat, etc. But the proposed application enables users to send messages to other
users through the Bluetooth network established between the user devices. The application does not
require any Internet connection. The idea is to transfer data from the sender to the receiver where it
finds its way using a Dynamic routing algorithm. The middle devices (user devices that are not
participating in the communication) act as routers in the network. The app encrypts the messages
which are sent from the sender so that the middle devices cannot see them.

68. ANALYSIS AND OPTIMIZATION OF MACHINABILITY OF AL2O3 AND FLY


ASH REINFORCED ALUMINUM HYBRID COMPOSITES USING CARBIDE
INSERTS
V Veeranaath1*, Mobashir2, Ravi Shankar3

1,2,3 Department of Mechanical Engineering, SRM Institute of Science and Technology,


Kattankulathur, Chennai, India, 603203

Aluminum matrix hybrid composites reveal excellent mechanical behavior compared to traditional
materials for a wide range of conditions and applications. However, the machining of this kind of
composites is a challenging job due to its improved mechanical hardness. The problems faced during
cutting of these composites increased machining forces, poor surface quality, and increased tool wear.
Many types of research are still in progress across the world to overcome these issues by using a
variety of inserts and processing constraints. So, this paper is mainly focused on the study of the
machinability of aluminum hybrid composites. The composites are synthesized by employing stir
casting via varying the filler content, stirring duration, and speed. The fabricated composites are
machined using coated and uncoated carbide inserts. Machining forces, surface roughness, and insert
wear are assessed to learn the machinability of these materials by varying the machining constraints.
Taguchi analysis was employed to assess the effect of the constraints on the retorts.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
35 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

69. ANALYSIS OF THE UPSHOT OF HEAT TREATMENT ON PROPERTIES OF


MAGNESIUM HYBRID COMPOSITES

V Veeranaath1*, Uddhav Daga2, Yuvraj Kumar3

1,2,3 Department of Mechanical Engineering, SRM Institute of Science and Technology, Kattankulathur,
Chennai, India, 603203

Magnesium-based materials are in superior demand in auto industries due to their improved properties
and behavior. However, processing and further post-treatment of this kind of magnesium composites
is a stimulating chore because of its characteristics. In particular, heat treatment of this kind of
magnesium composites may induce a change in grain structure which in turn alters the properties
according to the need. So, this article is chiefly focused on the fabrication of magnesium composites
by filling with SiC and graphite. According to the Taguchi array, the composites were developed by
altering the filler content, stirring duration, and speed. Four samples were fabricated accordingly by
employing the stir casting technique. The fabricated composites were exposed to different types of
heat treatment processes such as annealing, normalizing, tempering, and quenching to learn the upshot
of the same on its behavior. The morphology of the dispersions of the developed composites was
analyzed using an optical microscope, the mechanical and physical behavior like hardness, density,
wear, and tensile tests were performed on the developed samples. The morphology and behavior of
the fabricated composites were compared and analyzed pre and post-heat treatment.

70. IMPROVING THE LIQUID INSULATION PERFORMANCE WITH


ANTIOXIDANTS
HelanGethse J
EEE (UG)
National Engineering College
Kovilpatti

Diana Hyden N
Dhanya K
EEE (UG)
National Engineering College
Kovilpatti

Samuel Pakianathan P
Muthuselvi G
EEE (UG)
National Engineering College
Kovilpatti

Transformer oil is mostly used to keep the transformer cool. It functions as a cooling agent. Mineral
oil has long been used in transformers. Mineral oil has a high dielectric strength, which allows it to
withstand high temperatures. Mineral oil's main disadvantage is that it is not environmentally friendly
and can be dangerous to the environment. The features of breakdown voltage (BDV), viscosity, flash

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
36 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

point, and fire point are measured and reported in this study, and the characteristics of olive oil are
compared to the characteristics of mineral oil.

71. MULTIPLE VENDOR E-PLATFORM FOR FARMERS


Dr. C. K. Gomathy, V. Jaswanth Reddy, P. Venkatesh

SCSVMV

This study motivates the farmer to utilize an e-commerce platform to shape their revenue. Ecommerce
is one of the fast-moving industries in the world. Many businesses were already shifted to e-commerce
and generating huge revenue within a short period of time. The major problem is "The farmer who
produces food for the nation is not benefitting with the income". Because there is no such dedicated
platform for farmers to generate profitable income for their cultivated products. Existing platforms are
combined with all categories (home, kitchen & electrical appliances) of products that might muddle
up farmers, and also the lack of internet knowledge is one of the reasons that a farmer may not be able
to sell their products online. To overcome this, The online multivendor platform will be helpful where
a farmer can able to sell or purchase anything related to the agriculture & farming category. A simple
user-friendly web page with multiple farmer vendors and multiple agricultural products along with
detailed studies (blogs) about the latest farming technologies, will surely shape the farming sector
revenue. This will benefit farmers to get internet knowledge and save both time and energy. Also, new
connections & communications will be established and the product stock will sell easily without any
labor help. In a nutshell, It is a dedicated multivendor platform for farmers with all farming products
like pesticides, seeds, fertilizers, crops, etc along with a knowledge base. So, this initiative will surely
play a vital role in uplifting & benefitting framers.

72. Q Learning Algorithms: An introduction


R.Raja Rajeswari
Research Scholar,
Department of Computer Science, Mother Teresa Women’s University,
Kodaikanal.

Dr.A.Pethalakshmi
Principal,
Alagappa Government Arts College,
Karaikudi

Reinforcement Learning is a combination of supervised learning and unsupervised learning, the two
main streams of Machine Learning and has many applications in Artificial Intelligence arena.
Reinforcement learning algorithms range from Q learning algorithms to Deep Q Network.

This research article analyses the elements of Reinforcement learning, discusses basics of Q
Learning algorithm ,with a simple implementation and concludes with the findings .

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
37 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

73. ACHIEVING MORE SECURITY IN ELECTRONIC MONEY FOR ECOMMERCE


WEBSITE THROUGH CRYPTOGRAPHY

Dr. V. Geetha1, K.Hemanth2, M.Chaitanya3 ,Dr. C.K.Gomathy4


1,4 Assistant Professor, Dept. of CSE, SCSVMV(Deemed to be University), Kancheepuram ,TamilNadu, India
2,3 Student,Dept. of CSE, SCSVMV(Deemed to be University), Kancheepuram ,TamilNadu, India

E-Commerce is the platform that merchant publish their products and makes online marketing process
online by using web browsers. Now days this online marketing is growing quickly and demand for it
is high. To purchase these products from the merchants, user needs to do an online transaction. Most
Internet payment gateways in e-commerce provide financial information to customers using believed
third parties directly to a payment gateway. Either the payment gateways follow the strict policies and
its there might be a chance of fraud that allows stealing the monetary information of users. So, this
project main role is to provide an effective and secured electronic payment gateway where users can
connect immediately to the merchants directly. In this proposed system the user would do the
transaction under a secret key that is generated by using encrypted algorithms, and the details of user
will be in secured mode. So, we can say that our protocol has much improved security analysis that
user can do their transactions without any doubt. Any payment gateway should have some entities are
confidentiality, integrity, non-repudiation, anonymity availability, authentication, and authorization.
We can say that these would give trust to the customers that their information will be in safe and
secured. And the proposed system of this project has these entities and maintains the customer details
or information secured.

74. A STUDY ON SPAM REVIEW DETECTION USING LINGUISTICS


Dr. V. Geetha1, Dr. C.K.Gomathy2

1, 2 Assistant Professor, Dept. of CSE, SCSVMV (Deemed to be University), Kancheepuram, TamilNadu, India

Social Media Services are emerging communication mediums for people to establish and manage
social relationships. On social media websites, consistently, billions of users are engaged in social
interaction, content and opinion dissemination, networking, recommendations, advertising, scouting,
alerting, and social campaigns. The hype of social media services open-up a new opinions and hurdles
to the study of social media networks, being of interest to many fields. Social media is a place where
social activities, business-oriented activities, entertainment, and information are traded. It inaugurated
a worldwide connectivity environment where communities of people share their interests, ideas,
talents and activities, or who are interested in interests and activities of others Although social network
has given enormous benefits to the people at the same time harming people with various devious
activities that take place on social platforms. This causes notable economic losses to our society and
even endangers national security. Platforms like Facebook, Twitter, LinkedIn, etc. are highly receptive
to malware activities. Twitter is one of the biggest microblogging networking platforms; it has more
than half a billion tweets posted every day on average by millions of users on Twitter. Such
adaptability and wide usage of Twitter and other social media networks makes it the target. They can
be easily invaded with poisonous activities such as malware intrusion, spam distribution, social
attacks, data breaches etc. Ad mailer/Spammers use social planning attack strategy to send junk tweets,
spam URLs, etc. This made twitter an exemplary field for the expansion of unidentified spam
accounts. The impact stimulates researchers to prepare a model that analyses, detects and recovers
from scandalous actions on Twitter. Twitter’s system is besieged with tens of millions of fake spam
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
38 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

profiles which may cause trouble for the normal user's security and privacy. To improve real customer
safety and recognition of spam profiles became key parts of the research.

75. SMART ROOM CONTROLLER FOR VISITORS USING INTERNET OF THINGS


Dr. V. Geetha1, Dr.C.K.Gomathy2

1, 2 Assistant Professor, Dept. of CSE, SCSVMV (Deemed to be University), Kancheepuram, TamilNadu, India

The user will be given a set of hardware with pre-installed software which needs to be placed at the
entrance the hardware will detect whether the person entering the premises is wearing a mask or not
and the body temperature using no contact temperature sensors after those two things have been
checked if the person’s body temp. is normal and he/she is wearing a mask than the gate will open or
vice versa automatic Room light and fan controls are mostly implemented in theatres, shopping malls.

But this is the case where we can control the lights and fans of the room as well as we can also count
how many persons are entering into the room and also shows how many are exiting the room. here in
this we have used the Arduino UNO board, IR sensors and LCD display screen.

76. A WEB BASED MANAGEMENT SYSTEM USING TRANSPORT SERVICE


Dr. C.K. Gomathy1, Dr.V Geetha2
1, 2 Assistant Professor, Dept. Of CSE, SCSVMV (Deemed to be University), Kanchipuram,
TamilNadu, India

Regular vehicle servicing helps vehicle owners prevent unexpected vehicular malfunctions.
Identifying vehicle problems at an early stage is essential before they’ll turn into significant issues.
Vehicle owners tend to visit vehicle garages to enquire about vehicle servicing. Vehicle mechanics
check the vehicle’s vital components and repair issues to ensure that they are in good shape and will
not fail unexpectedly. The researchers conducted the study to assess how vehicle service shops or
garages perform daily operations and transactions. The researchers gather initial data and found out
that most vehicle shops or garage still uses manual processes in handling their day-to-day transactions.
Recording of customer records, monitoring of vehicle repair progress, vehicle service updates,
transactions with clients, and billing are still done manually. Continuous use of manual methods will
slow the operation and response time of the garage to the inquiries of the customers. The researchers
have seen the need to upgrade the way how vehicle servicing garage operates. The implementation of
the system will both benefit vehicle garages and customers. For vehicle garages, utilizing the system
to operate the business will help them grow and increase business efficiency. For customers, they can
easily and conveniently make transactions for vehicle servicing.

77. MULTI-SOURCE MEDICAL DATA INTEGRATION AND MINING FOR


HEALTHCARE SERVICES
Dr. C.K. Gomathy1, Mr. K.Nishanth Reddy2, Mr. K.Sai Abhishek3, Dr.V Geetha4
1, 4 - Assistant Professor, Dept. Of CSE, SCSVMV (Deemed to be University), Kanchipuram, TamilNadu,
India
2, 3 - Student, Dept. Of CSE, SCSVMV (Deemed to be University), Kanchipuram, TamilNadu, India

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
39 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Standards with the advent of the Internet of Health (IoH) age, traditional medical or healthcare
resources are slowly moving to the web or the internet and generating a large amount of medical data
associated with patients, doctors, medications, medical infrastructure, and so on. The effective
integration and analysis of this IoH data are excellent indicators for disaster diagnostics and medical
care services. However, IoH dthe is usually distributed to different departments and contains the
privacy of the users. Therefore, it is often a challenging task to compile or extract sensitive IoH data,
where user privacy can be disclosed. To overcome the above difficulties, we prioritize a multi-source
medical data collection and mining solution for better health care services, called PDFM (Data Fusion
and Private Mining). With PDFM, we can search for similar medical records in a time-saving and
confidential manner, in order to provide patients with better medical and health care services. A test
team is developed and used to demonstrate the feasibility of a proposal for this task.

78.A STUDY ON REAL TIME OBJECT DETECTION AND TRACKING SYSTEM

Dr. V. Geetha 1Dr. C.K.Gomathy2


1,2Assistant Professor, , Department of Computer Science and Engineering,
Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya [SCSVMV Deemed to be University],
Kanchipuram, Tamil Nadu, India

Globally the amount of individuals of all ages visually impaired is calculable to be 285 million, of
whom thirty-nine million are blind. For these people knowing the surroundings learning about
anything is difficult compared to normal people. Some of them have personal assistants/ helpers to
help with this problem but a lot of them don’t. The main aim is to assist & support visually challenged
persons. Machine learning algorithms are used in a wide variety of applications, such as email filtering
and computer vision, where it is difficult or unfeasible to develop conventional algorithms to perform
the needed tasks. Deep learning has become the dominant approach for much ongoing work in the
field of machine learning. Deep learning (also known as deep structured learning) is part of a broader
family of machine learning methods based on artificial neural networks with representation learning.
Learning can be supervised, semi-supervised or unsupervised.

79. SMART HEALTH CARE DIAGNOSIS MANAGEMENT SYSTEM


Dr. V. Geetha1, Dr. C.K.Gomathy2

1,2 Assistant Professor, Dept. of CSE, SCSVMV(Deemed to be University), Kancheepuram ,TamilNadu, India

In the health-care industry, a system is critical for managing the administrative, financial, and clinical
components of a hospital. Accurate analysis of medical data aids early illness detection, patient
treatment, and community services, thanks to advances in data mining in the biomedical and
healthcare communities. When medical data is of poor quality, the precision of the study suffers.
Furthermore, different regions have distinct appearances of specific localised diseases, which may
make disease outbreak prediction more difficult.Machine learning techniques are provided in the
proposed system for effective prediction of various illness occurrences in disease-prone populations.
It tests the different estimation models on real-world hospital data. It uses a latent component model
to reconstruct missing data to address the challenge of incomplete data.It was tested on a cerebral
infarction that was a regional persistent condition. It employs the Machine Learning Decision Tree
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
40 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

technique to analyse structured and unstructured data from the hospital. It mines data sets to anticipate
likely diseases and hospitals. To our knowledge, no existing work in the field of medical big data
analytics has focused on both data types. When compared to various common estimate techniques,
our suggested algorithm has a calculation exactness of 94.8 percent and a convergence speed that is
faster than the Decision tree disease risk prediction algorithm.

80. DETECTING FORGED INFORMATION BASED ON MACHINE LEARNING


Dr. V. Geetha1,Dr C K Gomathy2

1, 2 Assistant Professor, Dept. of CSE, SCSVMV (Deemed to be University), Kancheepuram, TamilNadu, India

The Beginning of numerous years the technology is developing in many ways along with development
social networks also developed. In these social networks many news is spreading throughout in this
online world and in this news some news the real and which are fake. These fake news for various
fields that are political, commercial purposes has been arriving in huge count and spreads through
online social networks. By these fake news social networks users can get infected easily, which has
bought tremendous impact on society. An important aim is to improve the trustworthiness of
information on social networks is to detect the fake news frequently. This paper aims to investigate
the methods, principles and algorithms to identify the fake news articles, creators and subjects from
social networks and evaluating the performance. Information preciseness on social media is an
increasingly important corner, but web-scale hampers, ability to identify, evaluate correct the
information or so called "fake news", present in these platforms. In this paper, we propose a method
to detect ''fake news" and ways to apply it on social media. The outcome results may be improved by
applying various techniques and methods that are discussed in the paper. Outcome results suggest, the
fake news detection problem can be addressed with machine learning methods.

81. UNIFIED HEALTH CARE SYSTEM USING WEB FRAMEWORKS


Karthikeyan N
Assistant Professor
Sri Krishna College of Engineering and Technology
Coimbatore, India

Shameer B*, Sukumar E, Rakul V M


UG Scholar
Sri Krishna College of Engineering and Technology
Coimbatore, India

In the advanced period, there is various measure of sickness, crises that are happening step by step.
However, innovation has grown a ton, a few arrangements are fundamental in the clinical world as we
can see many individuals experience the ill effects of various medical conditions. As a solution for
this, we have come up with an idea to safeguard people’s life by sitting inside their home, a unified
health care system using web frameworks where we have included technologies like react js, bootstrap
as frontend, node js, and PHP as backend, MongoDB/MySQL as backend. As we considered
associating specialists using video call which can make individuals counsel and get analyzed and help
prescriptions and other information through video call. Alongside this, we have carried out different
highlights which empower individuals to handily get to individuals in touch. We have provided
different solutions in different parts that might include pill reminder, secured prescription storing,
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
41 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

doctor consultant using a toy, ambulance service, video conferencing with doctors. So that might
reduce the problems in these hard times.

82. ALCOHOL DETECTION AND EMERGENCY ALERT SYSTEM


D. Prem Raja
Assistant Professor
Dept. of IT,
Kalasalingam Academy of Research and Education
Tamil Nadu, india
K. Keerthana
Dept. of IT,
Kalasalingam Academy of Research and Education
Tamil Nadu, india

G. Barkavi
Dept. of IT,
Kalasalingam Academy of Research and Education
Tamil Nadu, india

V. Vasudevan
Senior Professor
Dept. of IT,
Kalasalingam Academy of Research and Education
Tamil Nadu, india

S. Aishwarya
Dept. of IT,
Kalasalingam Academy of Research and Education
Tamil Nadu, india

It is an absolute requirement in today's modern, fast-paced, and insecure environment to be aware of


safety precautions when driving a vehicle. Furthermore, the frequency of vehicle accidents is
increasing at an alarming rate. According to many statistics, the majority of accidents are caused by
the driver's intoxication or tiredness. The main parameters to consider while building the system
include knowing where the vehicles are, what the drivers are doing, and monitoring every occurrence
in real time. Basically, any driver monitoring system is created with the use of sensors and GSM to
continuously watch the driver and issue an alarm if any suspicious behave is detected, such as
excessive speeding, intoxication, fatigue, and so on. This is also an essential step to track down the
driver's driving patterns, which might be useful in making future decisions. From the perspective of
truck and state transport bus drivers, this system will be implemented. As we all know, the TNSTA is
losing a lot of money due to high maintenance costs for buses caused by reckless driving. The
deployment of this system, which makes use of all modern sensors and analysis tools, is critical for
keeping track of the driver's driving pattern.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
42 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

83. DEVELOPMENT OF HUMAN RESOURCE: A CRITICAL ANALYSIS OF INDIA


INNOVATION INDEX
Madhavi Damle1*, Bala Krishnamoorthy2
1* Symbiosis Institute of Digital and Telecom Management, Symbiosis International -Deemed University,
Lavale, Pune, 412115, India.
2Associate Dean (Accreditation), Professor, & Area Chairperson-Strategy, SBM, Narsee Monjee Institute of
Management Studies, Vile Parle, Mumbai, India (NMIMS),

India innovation index by NITI Aayog reports (2020) shows the Index framework. Performance output
from Macroeconomic indicators. These Indicators compared with some of the significant innovation
index studies for the difference in the outcomes and implications. The analysis also brings out a few
challenges identified. The findings of this study are that some of the areas critical as innovation capital
remain unexplored by this India innovation index framework. Knowledge management has some
lacuna, especially for following the Innovation success and outcomes within the Indian systems. The
paper identifies these challenges and problems for future work to address them.

Furthermore, the findings are the challenges to the present index where there is no recourse to a
regulation mechanism as these are aggregates. Moreover, the inconsistencies in the measures for
yearon-year patterns are further critically observed. The implication of this study is the three
challenges identified. Moreover, human resource development has also been analyzed for five years,
with inconsistencies. The paper critically analyses the implications of the resilient Innovation Index
for India.

84. AN OPTIMAL DEEP WAVELET AUTOENCODER-BASED DEEP NEURAL


NETWORK WITH THE USE OF RIDER CUCKOO SEARCH ALGORITHM FOR
CLASSIFICATION OF LUNG CANCER ON CT IMAGES
R. Tamilarasi
Research Scholar
Department of Computer Science,
University of Madras, Chennai-600025
Dr.S. Gopinathan
Associate Professor Department
of Computer Science,
University of Madras, Chennai-600025.

Early detection of lung cancer is the only possible way to improve a patient’s chance for survival. A
Computed Tomography (CT) scan used to find the position of tumour and identify the level of cancer
in the body. The current study presents an innovative automated diagnosis classification method for
CT images of lungs. In this work, the CT scan of lung images was analyzed with the assistance of
Optimal Deep Wavelet Autoencoder-Based Deep Neural Network (ODWADNN).A most accurate,
reliable and fast automated method was implemented to segment the liver tumour image using
AcceleratedGreedy snake’s algorithm (AGSA).Next, a technique for image compression using a deep
wavelet autoencoder (DWA), which blends the basic feature reduction property of autoencoder along
with the image decomposition property of wavelet transform is proposed. The combination of both
has a tremendous effect on sinking the size of the feature set for enduring further classification task
by using DNN. Here, the proposed RCSA is employed for training the DBN. The proposed RCSA is
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
43 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

designed by integrating the rider optimization algorithm (ROA) and Cuckoo Search (CS). A CT image
dataset was taken and the proposed DWA-DNN image classifier was considered to classify lung
nodules as normal, benign and malignant.The discussed method increases the lung cancer prediction
rate which is examined using MATLAB-based results such as Accuracy, Specificity, Precision, Recall
and F1 score.

85. A NOVEL METHOD OF APPROACHING TRANSPORTATION PROBLEM OF


HEXAGONAL FUZZY NUMBER

V.Tharakeswari1,1*, M.Kameswari2
1Department of Mathematics, Kalasalingam Academy of Research Education, Krishnankoil,
Tamilnadu, India-626126
1*Department of Mathematics,J.N.N Institute of Engineering, Usha Garden, Kannigaipair,
Thiruvallur,Tamilnadu, India-601102
2Department of Mathematics, Kalasalingam Academy of Research and Education, Krishnankoil, Tamilnadu,
India-626126

The linear programming problem is well-known as one of the most promising mathematical methods
for efficient resource allocation. Many real-world problems can be expressed as LPPs. Anyways in
occurring each day scenarios; it is arduous to obtain appropriate accurate data for the cost parameter,
resulting in a fuzzy environment. The subject of fuzzy transportation has a lot of consideration in
present-day. It assists the decision-maker in arriving at the best answer with appropriate data, which
is frequently used in engineering and management science situations. The prevalent goal of the
transportation problem to reduce the amount of transporting a production from multiple origins to
multiple targets. It is necessary to highlight the issue of balanced and unbalanced transportation. We
used the defuzzification method for hexagonal fuzzy numbers and offered novel approaches in this
research to be helpful for determining an IBFS for balanced and unbalanced transportation problems.

86. XGBOOST OPTIMIZED BY ADAPTIVE TREE PARZEN ESTIMATORS FOR


CREDIT RISK ANALYSIS
Sujoy Baitalik, Pradeep Sudhakaran
Department of Computing Technologies, School of Computing,
SRM Institute of Science and Technology, Kattankulathur-603203, Chengalpattu, Tamil Nadu, India

Credit Risk analysis of customers protects and ensures Banking institutions’ interests and have been a
core part of any financial system. Traditional Banks have been using decades old legacy systems for
all of their processes and these systems are no match for current Machine Learning and Deep Learning
algorithms. XGBoost is a tree-based distributed gradient boosting framework famous for its efficiency
and flexibility. The performance of XGBoost largely depends on its hyperparameters which can be
optimized. Methods like GridSearch and RandomSearch are largely used for hyperparameter
optimization but are inefficient in nature. This paper proposes a XGBoost based algorithm optimized
by Adaptive Tree Parzen Estimators (ATPE) for Credit Risk analysis. The hyperparameters of the

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
44 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

proposed algorithm, when optimized with ATPE give better results compared to the default model and
thus it can be used as a replacement for the legacy systems used in Banks for Credit Risk analysis.

87. A LIGHTWEIGHT RUBIK’S CUBE AND CHAOTIC-BASED IMAGE


ENCRYPTION AND KEY GENERATION ALGORITHM FOR MULTIMEDIA
INTERNET OF THINGS
1st Arjun Rajasekharan
Computer Science and Engineering ,
Indian Institute of Information Technology, Design and Manufacturing, Kancheepuram
Tamil Nadu, India
2nd Panchami V
Assistant professor, Computer Science and Engineering- Cyber Security, Indian Institute of Information
Technology, Kottayam
Kerala, India

The boom of social media networks, tend to increase the magnitude of multimedia content. This leads
to the evolution of the new field called Multimedia Internet of Things. As these devices are
resourceconstrained, there is a need for lightweight image encryption techniques to safeguard
multimedia data.

The proposed lightweight encryption algorithm is based on Chaotic theory since it become more
prevalent in current multimedia cryptography. This chaotic-based multimedia encryption tech- nique
uses 2D augmentation models for safe data transfer. The proposed technique not only preserves
the high encryption quality of chaotic maps but also have minimal residual clarity and key sensitivity.
The lightweight image encryption algorithm uses the Chaotic map model used for achieving
confusion and diffusion properties. We have also proposed a novel key generation algorithm used on
Rubik’s cube transformation and Logistic map. The initial values are generated using the Elliptic-
curve cryptography (ECC) key algorithm. The proposed system is applied on both medical images
(grayscale) as well as coloured images for analysing the computational complexity. As per the security
analysis, histograms of the encrypted images are gener- ally flat and dispersed over all pixel values.
These pictures exhibit average correlation values of 0.0010575 (horizontal), 0.013994 (vertical), and
0.00235 (diagonal), with an entropy of 7.86046675 (encrypted image). Therefore, the proposed
lightweight image encryption exhibits a high level of security.

88. MUSIC RECOMMENDATION USING EMOTION RECOGNITION


Pranav Kizhakkevellat Nair, Anand Suraj, Pradeep Sudhakaran
Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology,
Potheri, Kattankulathur-603203, Chengalpattu District, Tamilnadu, India.

Music has become an integral part of our lives. While emotions may be easy to describe, the intricacies
of emotions are harder to determine when one is experiencing them. Emotions are easier to understand
retrospectively. While experiencing strong emotions, one can easily get overwhelmed and bring rise
to feelings like loneliness, and other unhealthy emotions which can progress towards mental illness.
This project enables one to perceive emotions through music, thereby helping them realize and
acknowledge their emotions. This in turn serves as a medium to help one realize that they are not alone
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
45 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

because ultimately everyone listens to music. An emotion recognition algorithm is used with the help
of CNN, to determine the specific sentiment the individual is currently feeling and then recommend
specially made playlists of songs for them. It is not always evident that a person going through a tough
phase may open up about their feelings to people around them and hence making use of AI/ML to
identify a person’s emotion through their facial expressions captured over a span of time can help
them in getting over their emotions.

89. CLASSIFICATION OF YOGA HAND MUDRAS USING SIFT AND SURF


FEATURES
S. Abarna1, V. Rathikarani2, P. Dhanalakshmi3
1Research Scholar, 2Assistant Professor, 3Professor
1,2,3Department of Computer Science and Engineering, Annamalai University, Chidambaram,
Tamilnadu, India.
Yoga is a unique spiritual science of self-development and self-realization that teaches us how to live
our lives to their greatest potential. Yoga's integrated method creates profound harmony and
unwavering balance in the body and mind, allowing us to awaken our dormant ability for higher
consciousness, which is the true purpose of human evolution. Yoga's various acknowledged physical
and mental advantages have contributed significantly to the popularity of the practise. Due to a lack
of datasets and the requirement to detect mudra in real time, recognising yoga hand mudras is a
difficult undertaking. The yoga hand mudras are used as input in the proposed work, and the two
features Scale Invariant Feature Transform (SIFT) and Speeded-Up Robust Features (SURF) are
retrieved, followed by machine learning techniques namely Gaussian Naive Bayes (GNB) are used
for classification. In the experimental results the performance of SIFT with GNB yields better results.

90. QUERY CACHING IN BIGDATA ANALYTICS


Dr.C.K.Gomathy 1, K.Vishnu Vardhan 2, Unnam Pavithra 3
1Assistant Professor, Dept. Of CSE, SCSVMV (Deemed to be University), Kanchipuram, TamilNadu, India
2 Student, Dept. Of CSE, SCSVMV (Deemed to be University), Kanchipuram, TamilNadu, India
3 Student, Dept. Of CSE, SCSVMV (Deemed to be University), Kanchipuram, TamilNadu, India

Queries are the heart of analytics. Without them, there is no analytics. Data analysis is helping the
enterprise to make the final decisions on customer trends and predictions and the queries would be
large and take much time to execute on the cluster. This project would help queries to execute on
different platforms based on the configuration and cache the response for future reference by using a
database. The project helps customers to analyze the data faster and they can use it further for making
the decision. In Enterprize data is important. In companies, Decisions are to be made by the large
volume of data. We cannot store the huge volume of data in Relational databases and we can't update
it because it is vertical Scala. But Here Hadoop in HDFS is horizontal Scala and it stores a large
volume of data in a distributed manner. Our project helps in transferring data from Relational
databases like MySQL to Hadoop and it will be accessed by the Java Database Connectivity (JDBC).
The accessed data will be converted to the JavaScript object notation (JSON) format by using the
Gson library. The converted JSON format will be stored in a database for future use.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
46 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

91. DETECTION OF FACE MASK AND DISTANCE CALCULATION USING DEEP


LEARNING

Sarthak Gupta, Pradeep Sudhakaran


Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology,
Potheri, Kattankulathur-603203, Chengalpattu District, Tamilnadu, India.

One of the non-pharmaceutical strategies for minimising the main origin of COVID spat by any
individual already infected by the virus, is to wear a mask. This study aims to create, real-time system
that is highly accurate as well as is capapble of detecting any non-masked faces anywhere and force
people to wear masks in order to contribute to communal health. In this suggested system, modern
deep learning algorithms were integrated with geometric techniques to develop a robust modal that
covers three aspects of detection, tracking, and validation. As a result, the proposed approach benefits
society by saving time and lowering corona virus transmission. It can be useful in the current situation,
where the lockdown is being lifted to allow people to be inspected at public meetings, shopping malls,
and other locations. By lowering the number of persons required to inspect the public, automated
inspection saves time and money. It can also be used in any situation.

92. PENETRATION TESTING TECHNIQUE WITH REVERSE SHELL ATTACK


Aswathy Mohan
1PG Scholar
Ec-council CEHv11 Certified
Computer Science and Engineering
Francis Xavier Engineering College,
Anna University, Tirunelveli,

Tamil Nadu, India


IEEE Member: 97736154
Orchid Id : 0000-0002-0293-1656,

Dr. G Aravind Swaminathan


2Professor & Head of Department,
Computer Science and Engineering,
Francis Xavier Engineering College,
Anna University, Tirunelveli,
Tamil Nadu, India

Cybersecurity refers to the technique of using methodologies to safeguard networks from


cybercriminals which results in cyberattacks. Cyber-attacks refer to the non-legal stealing of
confidential data from organization networks by breaking network security. Network Security refers
to the methodologies implemented in the network of the organization both internal and external to
oppose intruder attacks. One of such topmost technology used for ensuring network security is
penetration Testing .

93. CONVERTING VOICE SIGNAL TO VISUAL INDIAN SIGN LANGUAGE


Anshul Kataria, Rajveer Mathur, Pradeep Sudhakaran

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
47 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology,
Potheri, Kattankulathur-603203, Chengalpattu District, Tamilnadu, India.

Sign language is a symbolic representation used by deaf people as their primary language. Unlike
acoustically conveyed sound patterns, sign language makes use of body posture and physical
communications to effectively express a person's words. It could be used to connect with people who
have trouble speaking, as well as non-hearing challenged people. With the development of new
technologies such as online applications, machine learning, and natural language processing, our
initiative intends to bridge the gap between these Deaf people and regular people. The main purpose
of this project is to construct a software/interface which accepts Audio/Voice as input and outputs
them to corresponding Sign Language for ill-hearing people. Hand forms, posture, and body
movements are all coordinated at the same time. The approach has 2 parts: first, it converts speech
into text using voice-to-text API; second, and then it represents the text using Parse Trees and uses
Natural Language Processing semantics (NLTK particularly) for lexical analysis of Sign Language
Grammar.. The work builds upon the rules of ISL (Indian Sign Language) and follows the ISL rules
of Grammar.

94. MODIFIED MUSIC POPULARITY PREDICTION WITH DEEP LEARNING


TECHNIQUES.
Mrs.N. Poornima
Assistant Professor
(Ordinary Grade)
Department of Computer Science
SRM Valliammai Engineering College
Chennai,

Ms.M. Aishwarya
Department of Computer Science
SRM Valliammai Engineering College
Chennai,

Ms.T.Aparna
Department of Computer Science
SRM Valliammai Engineering College
Chennai,

Ms.K.Divya
Department of Computer Science
SRM Valliammai Engineering College
Chennai,

Understanding music quality is very important not just for the artists World Health Organisation
produce and perform music however conjointly for the music-related trade. it's not been studied well
however music quality are often outlined, what its characteristics square measure, and whether or not
it are often foreseen, that square measure self-addressed during this paper. AEFS will choose the
foremost vital options by excavating each linear and nonlinear info among options, that is additional
versatile than the standard self-representation methodology for unsupervised feature choice with
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
48 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

solely linear assumptions. Deep Neural Networks (DNNs) are gaining progressive accomplishment
compared with several ancient Machine Learning (ML) models in numerous fields. Extensive
experiment results indicate that AN improvement algorithmic program will create effects on the DNN
model sensitivity to adversarial examples. That is, once coaching models and generating adversarial
examples, Adam optimizer will generate higher quality adversarial examples for structured datasets,
and Adadelta optimizer will generate higher quality adversarial examples for unstructured datasets.
additionally, the selection of optimizers doesn't have an effect on the fungibility of adversarial
examples.

95. APPLICATION OF GIS TECHNIQUES IN CITY TRAFFIC


*M.Monica Bhavania,Dr.A.Valarmathib
Ph.D Scholar,Anna University,Trichy and 620024,Indiaa
Assistant Professor,Anna University,Trichy and 620024,Indiab

Cities are spatially, culturally, socially, economically, politically, legally, democratically and
ecologically defined as a system. A Spatial System can be obtained from the land usage and urban
networks or services. Cities have the ability to uplift even a nation, modifying a city to a smart city to
make smarter nations by planning, management, governance and development systems. Presently,
planning a system gives the master plan, zonal plan,urban land management schemes and site planning
schemes to arrive at the goals of the spatial system that needs a keen re-look for creation of smarter
city. All the Management and governing systems currently in work are the legacy colonial with
inappropriate hierarchical system that is less responsive and in real-time outmoded cumbersome for
end users nowadays.

96. AN OVERVIEW ON ADVANCED GENETIC DISEASE DIAGNOSIS AND


PREDICTION TECHNIQUES USING GENOME DATA
Anitha. M1, Mahendran Radha1

1Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.

1Department of Bioinformatics, School of Life Sciences, Professor & Head, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.

A genetic disorder in individuals is caused by the inheritance of two alleles from the parents. This
review focuses on various techniques that are used to diagnose or predict the possibility of a genetic
disorder in patients. The conventional methods of prediction of genetic disorders use family histories
and lifestyle factors, this approach may decrease the prediction accuracy. Therefore, introducing
genetic risk score prediction based on SNP will increase the prediction accuracy and reduce the overall
screening time of medical history. These predictions are done by taking a few samples of blood or
sputum from the patient and sequencing the DNA to find the gene patterns. Genetic disorders can be
caused by both dominant and recessive alleles. The prediction is done by finding the gene in a
sequence that is increased or decreased in size; this is called Copy Number Variation (CNV). There
are many studies focused on finding the correlation between the CNV of two different genomes.
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
49 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Researchers used many techniques to find the correlation between CNVs including machine learning,
signal processing techniques. We carefully analyzed more than 50 peer-review journals and compared
various methods to find the similarity in various techniques.

97. DEVELOPING A NEXT-GENERATION MULTITUDINOUS EPITOPE-BASED


VACCINE AGAINST BIOTINIDASE DEFICIENCY; AN IMMUNOINFORMATICS
BASED APPROACH
Anitha M 1, Mahendran Radha1*
1Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
*Department of Bioinformatics, School of Life Sciences, Professor & Head, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.

Biotinidase deficiency is a rare genetic disorder brought out by BTD (Biotinidase gene) mutations.
Genetic disorders are not curable but there are drugs available for suppressing Biotinidase deficiency.
To overcome this problem a vaccine that is much effective is needed. The goal of the current research
is to develop an effective multitudinous epitope-based vaccine. Biotinidase protein was chosen as a
target, and various epitopes like B-cell and T-cell were predicted. Predicted epitopes were shown to
be stable, non-allergic, antigenic, stable, and responsive. Finalist epitopes were significantly antigenic
and overlapped. Using In silico Techniques, we predicted the Primary, secondary and tertiary,
stability, MHC class I and II binding properties, and ligand-receptor interaction for vaccine designing.
This vaccine shows high affinity with the human receptors IL-2 alpha and a beta chain. Further the
sequence was optimized for expression in a prokaryotic host and cloned into the pET-28a plasmid.
Docking studies further demonstrated that the forecasted peptides interacted with HLA-B7 allele. The
predicted vaccine could be a promising starting point for vaccine development against genetic
disorder. Furthermore, the suggested vaccine must be subjected to in vitro experiment and further
confirm to verify its immunogenic and safety profile.

98. CHARACTERIZATION OF PLANT DISEASE PREDICTION USING


CONVOLUTIONAL NEURAL NETWORK
Dr.C.K.Gomathy1,Kakamanu Jaya Sairam2,Illuru YadhuVamsi3 Dr V Geetha4
1,4 Assistant professor, Dept. of CSE, SCSVMV (Deemed to be university), Kanchipuram, TamilNadu
2, 3 UG Scholar, Dept. of CSE, SCSVMV (Deemed to be university)), Kanchipuram, TamilNadu

Agriculture is one of the main factors that determine the growth of a country. In India itself, about
65% of the population lives on agriculture. Due to different seasonal conditions, plants can be infected
with different kinds of diseases, which can affect the leaves of plants. First, the plant is infected, and
then the whole plant, which in turn affects the quality and quantity of plant growth. Because there are
many plants in the yard, it is difficult for human eyes to identify and classify the diseases of each plant
in the field. Since these diseases can be transmitted, it is very important to diagnose each plant.
Therefore, in this document, we introduce the automatic detection and classification of plant leaf
diseases based on artificial intelligence to quickly and easily identifies, classify and perform the
required tasks. Medicine to treat this disease. This is one way to achieve our goal of increasing
agricultural crop yields. In this method, we followed several steps i. Image acquisition, preprocessing,
segmentation and classification of images

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
50 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

99. FACEMASK DETECTION USING VIOLA–JONES ALGORITHM


1 Mr. A. Niranjan 2 Suhana Momeen 3 U. Tabusha 4 U. Vinitha
1 Assistant Professor, Department of Electronics & Communication Engineering, SCSVMV,
Kanchipuram, India.
2,3,4 UG Scholar, Department of Electronics & Communication Engineering, SCSVMV,
Kanchipuram, India.

Here, we introduce a face mask detection model which is based on computer vision. The proposed
model can be integrated with computer or laptop cameras allowing it to detect people who are wearing
masks and not wearing masks. The model has been put together using deep learning and classical
machine learning techniques with openCV, TensorFlow and keras. We have acknowledged about a
comparison between three machine learning algorithms to find the most suitable algorithm that yields
the highest accuracy. Using face mask recognition technique by using python programming and from
OpenCV library Haar cascade method. Object Detection using Haar featurebased cascade classifiers
is an effective object detection method proposed by Paul Viola and Michael Jones. Another research
in which hybrid model using deep and classical machine learning for face mask detection is presented.
A face mask detection dataset consists of with mask and without mask images, then using OpenCV to
do detection from a webcam. For this project Viola-Jones Algorithm method is used for face mask
detection.

100. AUTOMATIC DOORBELL USING ARDUINO NANO

1Mr. A. Niranjan 2V.K. Ramdas Coundinya 3R.V. Sarath Kumar 4T. Ravi Teja
1Assistant Professor, Department of Electronics & Communication Engineering, SCSVMV, Kanchipuram,
India.
2,3,4 UG Scholar, Department of Electronics & Communication Engineering, SCSVMV, Kanchipuram, India.

In this project, we will be designing an advanced doorbell that ensures safety from COVID-19
pandemic as it is fully touch proof. What If the person who came to our house cannot find the doorbell
or if the person has fever or if they maybe covid affected, what can be done to ensure?

How will it be if we use an automatic doorbell which checks their temperature and gives us instructions
whether it is safe or not to let them inside and ring the bell only when he is good? There are no more
hassles. The person who comes to our house need not search for the doorbell and press it anymore. If
we install this automatic doorbell using an object detection circuit on the door itself, the circuit will
automatically sense the presence of the person and ring the doorbell.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
51 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

101. UPPER LIMB ANATOMY LEARNING WITH VR

Janani S
Student, Information Science and Technology
College of Engineering Guindy, Anna University
Chennai, India
Yoheshwar S
Student, Information Science and Technology
College of Engineering Guindy, Anna University
Chennai, India
Keerthana S
Student, Information Science and Technology
College of Engineering Guindy, Anna University
Chennai, India
Dr.K.Indra Gandhi
Assistant Professor(Sl.Gr), Information Science and Technology
College of Engineering Guindy, Anna University
Chennai, India

Anatomy is the important subject for school level science students and medical students. Upper Limb
anatomy is very complex. Memorising the details about all parts of upper limb is difficult and need
much imagination. Virtual Reality (VR) is the best tool for the enhancement of learning process of
upper limb anatomy. This helps students in the thorough understanding of the upper limb anatomical
structure based on visualisation rather than memorising. Three Dimensional (3D) models of shoulder,
forearm, arm and hand are created with its complete internal structure using Computed Tomography
(CT) Digital Imaging and Communications in Medicine (DICOM). Refinement of 3D models is done
further. Models created are rendered in virtual environment in unity. Anatomical labelling, audio
description about the parts is also added. Finally well refined model is rendered in virtual environment
using which students can learn the internal structures effectively. So our ultimate goal is to develop a
VR application where students can learn upper limb anatomy through 3D models.

102. NEWS CLASSIFICATION FOR INDIAN LANGUAGES BASED ON THEIR


HEADLINES USING MACHINE LEARNING AND DEEP LEARNING MODELS

Nagani Vrudant Gopalbhai


Department of Computer Science and Engineering
SRM Institute of Science and Technology
Kattankulathur, India
Vishal Parekh
Department of Computer Science and Engineering
SRM Institute of Science and Technology
Kattankulathur, India
Anita Ramalingam
Department of Computer Science and Engineering
SRM Institute of Science and Technology
Kattankulathur, India
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
52 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

During the last few years, text mining has become increasingly significant. Users may now access
news from a number of sources, including electronic media, digital media, print media, and many
more. In this paper, we focused on text classification, classifiers, and a variety of feature extraction
strategies, but only for short texts, such as news categorization based on headlines. There are few
resources for all Indian languages, and the majority of them are not frequently utilized in text
classification. Existing classifiers are mostly focused on accurately recognizing English news
headlines, with minimal attention paid to Indian languages.
This paper presents an extensive comparison of predefined models vs a CNN model for English, Hindi,
and Gujarati news headlines. Our experimental results showed solid performance of all models on the
English dataset with a minimum accuracy of 89.33%, achieved by RFC, and top performance of
95.04%, achieved by MNB. As for Gujarati dataset and Hindi dataset, CNN achieved the highest
overall accuracy of 89.12% and 87.58% respectively. All the models can classify headlines into 5
categories for all datasets.

103. A/B TESTING FOR INDUSTRIAL COMAPANIES

Anjali Agrawal
Computer Science and Engineering
B.Tech.
of SRM Institute of Science and
Technology
Chennai, India

Dr. S. Prabakeran
Department Of Networking And
Communications of SRM Institute of Science
and Technology
Chennai, India

Preeti Vijayan
Technology Consulting - BI & Analytics
Tiger Analytics
Chennai, India

User-intensive software, like mobile applications and websites, heavily depends on interactions with
many users and an unknown population. With the internet connectivity on such software, the website
allows evaluating ideas and innovations using continuous experiments like A/B tests, split tests. We
aim to study the application of A/B testing in various industrial contexts. We will also present a brief
study on different statistical tests for different assumptions and solve them using the Bayesian
algorithm. Randomized algorithms are used to address various software engineering problems. This
type of algorithm gives different results with every run for the same problem instance. Therefore, a
statistical test is important to prove the conclusions derived from the data.

104. IMPROVED DIGITAL TWINNING TECHNIQUES FOR SMART SIMULATIONS


Dr.SHAIK JAVED PARVEZ, AKASH VENKATESAN, VANRAJ D
HINDUSTAN INSTITUTE OF TECHNOLOGY & SCIENCE,CHENNAI

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
53 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Digital twinning is a visual representation of a visual object designed to reflect exactly. The object
being investigated - that is The data is collected from sensors to generate energy and other aspects of
material activity. This data is later sent to a processing machine, where it is used in digital copy. This
paper proposes a method where digital twinning uses machine algorithm with 5G Network and it also
uses simulation program that allows replicate the orginal product or source. It creates a virtual to
physical twinning making it more effective.

105. MEDICAL CHATBOT USING MACHINE LEARNING AND NLP


B.E.S.M. VISWANADH
Department of Computer
Science and Engineering.
Hindustan Institute of Technology and Science.
Chennai, India.
PRISKILLA PERKINS A
Department of Computer Science and Engineering.
Hindustan Institute of Technology and Science. Chennai, India.

M. HANUMANTHA RAO
Department of Computer Science and Engineering.
Hindustan Institute of Technology and Science. Chennai, India.
Dr.MAGDALENE R
Department of Computer Science and Engineering.
Hindustan Institute of Technology and Science. Chennai, India.

Chatbots are software developed using machine learning to stimulate a conversation with a user in real
time. Chatbots have important role in news, social media, transactional and customer service. Users
engage with chatbots every day on their devices even without realizing. Chatbots can provide news
updates, sport updates and bank applications. We can implement the chatbots in medical industry for
patient care and health guidance. Chatbots will improve medical care delivery and will also lead to
significant healthcare cost savings.

106. ASTHMA PREDICTION USING MACHINE LEARNING CLASSIFIERS

Swetha.P1, Joshua Amrish.A2, G. Gnancy Subha3, Dr. Chitra Sudhakaran4, Raveena.R5, Parveen Meera.S6
1,2,5&6Department of Biomedical Engineering, SPIHER.
3Assistant Professor- Department of Biomedical Engineering, SPIHER.
4Associate Professor- Department of Biomedical Engineering, SPIHER.

Asthma is a lung illness caused by inflammation and airway obstruction that produces shortness of
breath, wheezing, and often life-threatening attacks. Patients with asthma must be able to predict
severe exacerbations caused by uncontrolled asthma. As a result, a framework that can accurately
forecast the likelihood of asthma in a patient is required. By mining the data comprising patients'
previous health records, an effective mechanism for asthma disease prediction has been developed in
this research. To display the results, we employ machine learning algorithms. KNN, ANN, SVM, and

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
54 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Linear Regression are four machine learning classification algorithms employed in these trials to
predict asthma disease at an early stage. The efficiency of all four models is assessed using a variety
of metrics. The accuracy of a classification system is measured by the number of cases that are
classified properly and inaccurately. The results of the experiments demonstrate that SVM techniques
have the highest accuracy. MATLAB software is used to display the outcomes of the experiments.

107. A NOVAL APPROACH FOR WSN USING SHORTEST PATH (DIJKSTRAS


ALGORITHM)
Dinesh Kumar J R
Assistant Professor Department of Electronics and Communication
Engineering Sri Krishna College of Engineering and Technology, Coimbatore,
India.
Pranesh K
Department of Electronics and Communication Engineering
Sri Krishna College of Engineering and Technology,
Coimbatore, India.
Rahul S
Department of Electronics and Communication Engineering
Sri Krishna College of Engineering and Technology,
Coimbatore, India.

Sanjeev C P
Department of Electronics and Communication Engineering
Sri Krishna College of Engineering and Technology,
Coimbatore, India.

To realize productivity of delaying the existence over sensor networks several plans hold been
proposed. Among this plans, a bunching convention is an wonderful approach up to expectation drags
out the existence on an organization. Notwithstanding, in applying that technique, a few hubs
burnthrough energy superfluously so a result over a local weather whereby the gathered records on
the sensor hubs effectively covers. In that paper, we endorse a Clustered Multi-hop Routing Algorithm
as decreases superfluous facts transmission amongst hubs by means of but the duplication of
information. This strategy forestalls data misfortune added respecting by means of connect
disappointment problem then consequently the records is gathered dependably. As indicated via the
consequences on the present examination, our approach lessens the electricity utilization, expands the
transmission proficiency, then delays community quick so contrasted with the cutting-edge bunching
strategies.

108. IOT BASED SMART CHARGING SYSTEM


Dr.R. Devi,
Asst. Professor Electrical and Electronics Engineering
Sri Krishna College of Technology
Coimbatore, India
Akash G
Electrical and Electronics Engineering
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
55 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Sri Krishna College of Technology


Coimbatore, India
Dinesh Kumar.M
Electrical and Electronics Engineering
Sri Krishna College of Technology
Coimbatore, India
Hariharan D
Electrical and Electronics Engineering
Sri Krishna College of Technology
Coimbatore, India
Electrical and Electronics Engineering
Sri Krishna College of Technology
Coimbatore, India

This project, Smart Power Monitoring and Control Systems, is one of the few ways to use the Internet
of Things. Thanks to the Internet of Things, energy-efficient gadgets can be created, reducing both
energy and human use. As part of this project, we aim to develop a smart charging system that
improves battery life by reducing battery pressure and automatically controlling its use. web server
and battery charged. On the IoT platform, there is an ESP8266 module, and the web server is stored
in the module. Because webserver is platform-agnostic, it can be used on any device, including
smartphones. These devices send commands to the web server. This project helps with automatic
monitoring of the device and notification of the smartphone, and thus saves both the energy and time
required to maintain the equipment. The battery can be charged once the device is connected, and it
can be charged only when necessary, and the system can monitor other. Electrical items. Battery life
may be extended by minimizing the fast charge by switching over the corresponding connection to
the series.

109. TRAVALONG– A TOURISM MANAGEMENT WITH IMAGE SEARCH SYSTEM


USING PIXABAY
Dr.Arun manicka raja, CSE,
RMK College of Engineering and Technology,
Thiruvallur,Tamilnadu.
Abinayaasri M, CSE,
RMK College Of Engineering and Technology,
Thiruvallur, Tamilnadu
Anitha C, CSE,
RMK College Of Engineering and Technology
Thiruvallur, Tamilnadu
Keerthana S, CSE,
RMK College Of Engineering and Technology
Thiruvallur, Tamilnadu

The main purpose of “Online tour booking website” is to provide a convenient way for a customer to
book hotels, flight, train and bus as a single package for tour purposes. A customer finds it very
difficult to search for the best package as he/she has to browse multiple websites, contact many travel
agents, etc. which is a tedious process and is time consuming. There should be a system where the
user should find the best package on the Internet with a single click. To address this issue, we created
an online tour booking website which offers the best package among all the other packages that are
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
56 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

on the web. A customer will select a travel package for a particular place based on the
recommendations provided by the previous customers who had experience with the package. If the
customer likes to visit a particular place, they can easily search the place on the website. They can
also suggest a customized package and send it to us through the contact page. We included a map view
for the specified route. The website is very user-friendly which helps the user to book easily. They
can directly contact us through the mail facility given on the contact page.The objective of this project
is to develop a system that automates the processes and activities of a travel agency. In this project,
we will make an easier task of searching places and for booking train, flight or bus.This application is
to provide best traveling services to the customers and travel agents. We have developed tours and
travel management systems to provide a search platform where a tourist can find their tour places
according to their choices. This system also helps to promote responsible and interesting tourism so
that people can enjoy their holidays at their favorable places. This system also helps to develop tourism
with different cultures so that they enrich the tourism experience and build pride. We develop this
system to create and promote forms of tourism that provide healthy interaction opportunities for
tourists and locals and increase better understanding of different cultures, customs, lifestyles,
traditional knowledge and beliefs. This system also provides a better way to connect with various
events.

110. ML ASSISTED LOCALIZATION ALGORITHMS FOR INDOOR/OUTDOOR


SETTINGS: AN INTROSPECTION
Chirantan Ganguly1, Sagnik Nayak1, Anil Kumar Gupta2, Suresh V.2, Pradeep Kumar CH2
1 Institute of Radio Physics and Electronics, University of Calcutta, Kolkata, West Bengal, India
2Centre for Development of Advanced Computing (CDAC), Pune, Maharashtra, India

The development of novel technologies has led to an upsurge in the demand for precise localization
in outdoor as well as indoor environments. As GPS continues to provide sufficient positioning
precision in outdoor settings, its accuracy falters in indoor scenarios, which necessitates the
development of novel positioning approaches that function accurately both indoors and outdoors. The
use of various WLAN parameters for localization has been conceptualized. In this study, we attempt
to do localization using Machine Learning methods on WLAN RSSI measurements. We compare the
performance of multiple machine learning algorithms on the dataset to see which can be used to design
efficient future localization systems. The proposed study has achieved second place for the problem
statement "ITU-ML5G-PS-016: Location estimation using RSSI of wireless LAN" in AI/ML in 5G
Challenge 2021 organized by the International Telecommunication Union.

111. EVALUATION OF THE FUNCTIONAL ROLES PLAYED BY THE


DORSOLATERAL PREFRONTAL CORTEX IN HUMAN COGNITION
Sujatha Ramesh1, Sanjana Iyer2 and K. Natarajan3
1 Post-Graduate Student, Lovely Professional University, Phagwara,
Punjab 2 Hiranandani Foundation School, Powai, Mumbai,
Maharashtra 3 ISRO (Retd.), Tiruvananthapuram, Kerala

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
57 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Investigation of human intelligence has assumed considerable importance to the cognitive scientists
during the recent past, since executive control is the single biggest differentiating quality of the human
brain, even during early childhood education. It is housed in the neo-cortex, the area that has
developed most recently in our evolution. Specifically, the large and significant complexity developed
in the prefrontal cortical area (PFC) of the brain is a unique feature of humans, as compared to even
the great apes. Within the lifetime of a human being, the PFC in human babies has been considered
to evolve later than the more primitive parts of the brain – it happens in early childhood and into
adolescence, as demonstrated by the relative lack of self-control exhibited by babies and toddlers, but
with increase of such control through the years of growth. While the PFC is broadly responsible for
executive control of all sorts, specific functional areas doing specific roles have been delineated by
studies using modern imaging techniques. Even so, there is some variability in findings and indeed
even some conflicting results. This paper has evaluated the various roles played by the dorsolateral
Pre-frontal Cortex (dlPFC) in the human brain, based on the extensive survey of reliable published
data on the subject. In young children, the role of the dlPFC is evident in the form of temptation-
resistance and aggression-regulation. Understanding of the specifically delineated roles of the dlPFC
is especially relevant now given the exposure of even very young children to social rejection, making
them vulnerable to greater aggression as a defensive response. This investigation has clearly revealed
that the dlPFC has been repeatedly implicated in certain executive functions, while variably implicated
in some others. Based on the preliminary study, an attempt has been made to delineate the ones that
have the most likely direct relationship with the dlPFC. For adults, this has implications in the study
of depression, treatment options for Alzheimer’s, autism, Parkinson’s disease, and other prevalent
neurological deficits. During early childhood, it potentially provides the basis for helping children
manage their emotional responses and develop controlled, well-deliberated behavior in response to
social challenges.

112. RECENT TRENDS IN NEURAL NETWORK-BASED APPROACHES TO


VISUAL PROCESSING VIS-A-VIS THEIR BIOLOGICAL CORRELATES IN THE
BRAIN
Sujatha Ramesh1, Sanjana Iyer2 and K. Natarajan3
1 Post Graduate Student, Lovely Professional University (LPU), Phagwara,
Punjab 2 Hiranandani Foundation School, Powai, Mumbai, Maharashtra
3 ISRO (Retd.), Tiruvananthapuram, Kerala

The rapid pace of recent advances in the realm of Artificial Neural Networks (ANN) and the
simultaneous developments in the space of brain function study have led to a dual-development of
neurosciences and neural networks in tandem. Several instances exist where the two realms have
taken inspiration from each other to make large leaps of progress. In this paper, we have analyzed the
recent convolutional neural network (CNN) algorithms that provide insights into the workings of the
biological brain in visual perception. We have also identified the challenges and possibilities of
interdisciplinary work through symbiotic collaboration between these disparate fields of research.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
58 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

113. EXPLORATIVE STUDY ON CHILDREN’S INTERNET USAGE AND


PARENTAL CONTROL IN INDIA – USING CLASSIFICATION TREE MODEL
ANALYSIS
*K. Periyakannan and ** Dr. Arulchelvan Sriram

Department of Media Sciences, Anna University, Chennai, India

In this period of innovation, the internet has spread broadly and has been utilized for various purposes
by children. Particularly usage of the internet among school students increased in recent years. At the
same time, researchers indicate that there is an increase in internet usage and behavioral problems.
The objectives of this study are to examine the impact of internet usage and parental mediation on
school children. The participants were determined with purposive sampling and conducted under
different schools children in Chennai (N= 424) respondents and from the 14-17 age groups those were
analyzed by CART used to describe decision tree algorithms that are used for a classification tree
model and regression. These results show that most children used the internet without parental
guidance. During pandemics, time children are using more than hours on the internet and social media
which impact their online activities of children. This study identified to regular monitoring is expected
to avoid psychologically harmful effects. The future lives, health, and psychological changes of
children, and online abuse.

114. A REVIEW PAPER ON DIMENSIONALITY REDUCTION TECHNIQUES


Mr. Faizan Riyaz Mulla
Bachelor of Engineering in Computer Science, AISSMS College of Engineering Pune,
India. 411007.
Dr. Anil Kumar Gupta
Centre for Development of Advanced Computing (C-DAC)
Pune, India. 411007.

Dimensionality Reduction (DR) is the process of reducing the numerous features or random variables
under consideration to a limited number of features by obtaining a set of principal variables. These
techniques cater great values in machine learning, which come in handy to simplify a classification or
a regression dataset, thereby yielding a better-performing predictive model. Techniques used for DR
include Feature Selection methods, Matrix Factorization, AutoEncoder methods, and Manifold
Learning. Merits of DR include data compression, reduced space of storage, and removal of redundant
features. This paper attempts to review various techniques used to carry out dimensionality reduction
while providing an exhaustive comparative study over the merits and demerits of each of the
techniques used under the empirical experiments performed by the authors whose work is being
reviewed.

115. SOLARPANEL DUAL MANAGEMENT SYSTEM


First A. Anandh Krushna S K, Second B. Deepananth K, Third C. Praveen Kumar S, Fourth D. Nithish
Bharathwaj K R, Fifth E. Lekshmi Kalinathan, Sixth F. Nagarajan K K
Sri Sivasubramaniya Nadar College of Engineering, Kalavakkam, Tamil Nadu, India

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
59 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Solar Energy is a renewable source of energy and it is easy to extract electric energy from it. But many
factors such as dust deposition, size of solar panels, affect the efficiency. Mainly, the deposition of
dust on the surface of the panel reduces the output power. At present, regular manual checking is
required to monitor the accumulation of dust on the solar panel that causes a drop in output voltage.
Current theft prevention system has limitations like alerting the consumer even when insignificant
objects pass through the mechanism installed. This inefficient performance may lead to theft and loss
in investment. If above-mentioned problems are given proper attention, we can avoid theft and prevent
loss of power generated from solar panels. This paper gives a detailed review on Solar Panel Dual
Management System which can detect unauthorised activities and automates the detection of dust
deposition on solar panel.

116. SOCIAL IMPACT ASSESSMENT IN PROTECTED AREAS OF PANNA


NATIONAL PARK, MADHYA PRADESH
Ms. Sushmi Nimje
Architecture and Planning department, MNIT, Jaipur, India

According to The International Ecotourism Society, Ecotourism is defined as “responsible travel to


natural areas that conserves the environment, sustains the well-being of the local people, and involves
interpretation and education”. Some recent studies strongly suggest ecotourism as a tool for
environmental conservation and the socio-economic development of the local community. India being
a biodiverse nation, has various potential destinations for ecotourism development, such as Panna
National Park, India. This study focuses on understanding the local community of Panna National
Park by conducting a social impact assessment and the effect these tourist places have on the
development of these communities. The assessment will help develop recommendations and strategies
that will help maintain environmental integrity and sustainability with the involvement of the local
community of this ecotourism destination. The study describes the perceived benefits and costs of
ecotourism mainly depend on the level of community participation in ecotourism activities and the
availability of resources. In this context, the study aims to critically explore the local environmental
issues, dynamics of tourism planning, and its relationship with and contribution towards sustainability
in the Protected Areas of Panna National Park.

117. ATTRIBUTE BASED ACCESS CONTROL MODEL FOR EHR


Dr.K.Gurunathan1,G.Arun2,B.Karthick3,R.Srikathirvel4,S.Sugi5
1 Associate Professor, Department of Information Technology, M.Kumarasamy College of
Engineering,Karur,TamilNadu,India-639113
2,3,4,5 UG Students, Department of Information Technology, M.Kumarasamy College of
Engineering,Karur,TamilNadu,India-639113

The transmission of digital medical images for e-health services has recently piqued people's curiosity.
However, current implementations of this service do not place a high priority on patient confidentiality
and data security. In the medical field, the necessity for quick and secure communication is critical.
Nowadays, picture transmission is a daily occurrence, and it is vital to establish an efficient method
of doing so via the internet. We present a new technique for ciphering a picture for safe and denoised
transmission in this study. Image cryptography, data hiding, and Steganography are all discussed in
this paper. We introduce a new medical image Steganography technique for securing patients'
sensitive information by embedding it in the image itself while keeping excellent image quality and
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
60 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

embedding capacity, and we use LSB substitution based nine pixels differencing in this project. In
addition, a hybrid paradigm based on key there in public sphere Steganography and Elli Curve
Cryptography (ECC) have already been developed. Which approaches are much more secured as using
an unique ECC or steganography.

118. IMPLEMENTING FUZZY LOGIC TO IMPROVE THE NETWORK SELECTION


PROCESS FOR HETEROGENEOUS HANDOVER
Priyanka A*, Jayachithra N, Dr Chandrasekar C
Department of Computer Science, Periyar University, Salem, Tamil Nadu, India.

Ubiquitous user demands are increasing and they commonly opt for networks that always offer a
pleasant seamless connection. A well-known and vital requirement is an unbroken drift of voice and
data with transceivers. In a state of affairs just like the non-stop mobility of the mobile terminal, the
attached access point may relinquish its connection because of the fluctuation of signal power. A
single operator to handle the network connection for the mobile terminal is not capable to fulfill the
user demands when they are in high mobility. So the handover process is crucial for seamless
communication. The mobile terminal's vital task is to select the best network from the number of
available networks. In the network selection process right here we use a combined technique called
Fuzzy TOPSIS (Fuzzy Technique for Order Preference by Similarity to Ideal Solution) and Fuzzy
AHP (Fuzzy Analytic Hierarchy Process). Different parameters are also considered to recognize which
one is best to carry the devices.

119. MEGAPSO: MOBILITY AWARE ENERGY EFFICIENT HYBRID GA & PSO


BASED CLUSTERING FOR MANET
Priyanka A*, Jayachithra N, Dr Chandrasekar C
Department of Computer Science, Periyar University, Salem, Tamil Nadu, India.

In this work, hybrid GA & PSO is used to group the mobile nodes based on the similar behaviour in
MANET. The devices in this network have the freedom to go anywhere in any direction at different
speeds. The unpredictable movement of a node makes a non-stable network, loss of energy, and
repeated changes in topology. This migration behaviour of the devices leads the network to become
dynamic. Non-stability may cause link failure, packet loss, repeated root-finding overhead, energy
loss, topology change, routing table update, etc. To make the network turn out to be standard, cluster
formation is proposed to assemble a number of individuals into groups. Balanced clusters are required
to give a long life for the cluster members & clustering can achieve scalability. Clustering is organizing
things into meaningful groups based on the similarities among the devices. In this grouping system,
there is a cluster head selected for each & every group based on the parameters like mobility, distance,
energy, degree of connectivity, and transmission range. The cluster members are associated with the
CH based on the mobility of the individuals. The Mobility Aware Energy Efficient Hybrid GA & PSO
is proposed here to form the cluster.

120. WATER CONSUMPTION IN THE POWER SECTOR IN INDIA - PROBLEMS


AND PROSPECTS
Ms Sushmi Nimje1, Dr Niruti Gupta2 and Dr Yash Kumar Mittal3
1Architecture & Planning department, Malaviya National Institute of Technology, Jaipur, India
2Architecture & Planning department, Malaviya National Institute of Technology, Jaipur, India
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
61 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

3Architecture & Planning department, Malaviya National Institute of Technology, Jaipur, India

India is a water-stressed country where demand will outstrip availability by a ratio of two by 2030,
putting hundreds of millions of people at risk of acute water scarcity (Niti Aayog). The power sector
in India is heavily reliant on water. Thermal power plants generate over 80% of India's electricity
(CEA 2017), and they rely on water for cooling. Another 10% of electricity is produced by
hydropower plants, which purely run on water. Any modifications to either the energy or the water
system are likely to affect the other system directly or indirectly. Water and energy are intrinsically
linked. There are multiple cases where power plants have been forced to shut down permanently or
temporarily due to a lack of water. As the population grows, so does the demand for energy, putting
strain on our water supplies. This paper aims to identify the problems and prospects in power sector
in relation to water consumption. There are few rules and regulations concerning water usage in the
power sector. There is limited policy for water consumption in power plants and no perspective for
tackling water scarcity in the future; hence, the study on water energy nexus becomes vital for
managing water resources across all countries.

121. RFID BASED WIRELESS CHARGING STATION FOR ELECTRIC VEHICLES


USING ARDUNIO AND PAYMENT SYSTEM
Dr.Kyung Tae Kim
Department of Electronics and Communication Engineering
Kalasalingam Acadamy of Research and Education
Krishnankoil, India

Aleti Saimanohar Reddy


Department of Electronics and Communication Engineering
Kalasalingam Acadamy of Research and Education
Krishnankoil, India

Naddiboyian Naga Surendra


Department of Electronics and Communication Engineering
Kalasalingam Acadamy of Research and Education
Krishnankoil, India

Mallireddy Ashok Reddy


Department of Electronics and Communication Engineering
Kalasalingam Acadamy of Research and Education
Krishnankoil, India

In this paper, we are going to propose “iot&rfid wireless vehicles charging using arduino Due to
increase in price of petrol and to decrease ecological contamination, the utilization of electric vehicles
(EV) is quickly expanding, rather than ignition motor vehicles. The primary concern issue of the EV
clients is being tended to through different charging strategies. The vital trouble in execution of EV is
course of action of charging framework. The remote charging framework (WCS) is a most loved
choice in the developing EV market.

As the new time of the auto, the business is quickly changing from an IC motor vehicle to an electric
vehicle. The interest for an electric vehicle is expanding, these lead to an expansion in charging station
too. In this task, a remote charging framework is utilized to charge the vehicle remotely by means of
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
62 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

inductive coupling. we essentially need to leave the vehicle on the charging spot. The transmission of
electrical energy from source to stack from a distance with next to no directing wire or links is called
Wireless Power Transmission. This framework doesn't need any human cooperation. The aftereffect
of this venture is we can charge our vehicles remotely by means of inductive coupling and can transfer
the vehicle numbers to the cloud which are put away in RFID labels. Remote power transmission may
be one of the advancements that are one stage towards what's to come. This undertaking can open up
additional opportunities of remote charging that can use in our day-to-day routines.

122. ASSESSMENT OF VARIOUS MILK PARAMETER MONITORING SYSTEM


USING AN IOT
1Mr. Jenyfal Sampson , 2J.Santhosh kumar, 3P.Aswin Bharathi, 4 B.Subash Raj,
1,2,3,4Electronics and Communcation Engineering, Kalasalingam Acamedy Of Research and Education,
Tamil Nadu, India

The project presents a modern device for Assessment of various milk parameter monitoring system
using an IOT. As milk is the major food for all the infants, it has to be monitored for the safety of the
child and old ages people. The main objective of the project is to bring out the product (i.e. compact
device) which determines the quality and the safety of milk for consumption. This project determines
many parameters of milk by using five sensors. Here, we consider parameters like temperature , pH,
Color, Gas, Air sensors to determine the quality of the milk. The Temperature sensor is used to
determine the hotness or coldness of milk. The pH sensor is used to determine the pH of the milk (i.e.
whether Fat, Ammonia, Parteurised or Fresh or Rotten in its nature). The Gas sensor is used to
determine the smell of the milk. The Air sensor is used to determine the ethanol level of the milk. The
Color sensor is used to identifying the colour milk. By using the temperature , pH, Color, Gas, Air
sensors we can get output by displaying using LCD. By using tempature sensor Blynk Application
will send report to the mobile.

123. ONLINE FOOD ORDERING SYSTEM


Sruthi R, Vellore Institute of Technology, Chennai

This project proposes the Online Food Ordering System. The case study aims to design and develop a
database maintaining the records of users. Our website provides management of users and their orders
along with the payment details and the delivery partners assigned bringing in an ease in the entire
functioning of online food ordering systems. By keeping efficient tracks of who was assigned to
deliver which order and what was the order amount along with customer details it first helps keep a
track of service and sale, and other, helps to manage complains, refunds and salaries of the deliver
agents.

124. DATA AUGMENTATION TECHNIQUES FOR DIAGNOSIS OF KERATOCONUS


USING CONVOLUTIONAL NEURAL NETWORKS
Subramanian P and Ramesh G P
Department of Electronics and Communication Engineering,
St Peters Institute of Higher Education and Research, Chennai, India

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
63 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Keratoconus is a medical condition wherein the cornea attains a conical shape caused by the thinning
of the corneal stroma. This thinning of the stroma results in irregular astigmatism, short sightedness
and corneal protrusion causing deterioration in the vision and even blindness. Symptoms depend on
the stage of the keratoconus with the early stages getting unnoticed. The advanced stages, though, can
be identified by vision loss and protrusion. Diagnosis and classification of keratoconus has gained
significance with the advent of imaging technologies and machine learning. Machine learning when
applied to the automatic diagnosis or screening of Keratoconus requires a large dataset, for better
accuracy, which is difficult to obtain. Data augmentation techniques have been employed to increase
the size of dataset. This paper presents a review of the augmentation techniques available in the
literature and compares the performances for arriving at a suitable technique for improved accuracy
of classification.

125. IMPLEMENTATION OF DEEP NEURAL NETWORK MODEL FOR DETECTION


OF HUNTINGTON’S DISEASE IN HUMAN DNA SEQUENCE
G.Tamilpavai, C.Vishnuppriya
Department of Computer Science and Engineering,
Government College of Engineering, Tirunelveli, Tamil Nadu, India

Huntington Disease (HD) is one type of neurodegenerative disorder which creates problems like
psychiatric disturbances, movement problem, weight loss and problem in sleep. It needs to be address
in earlier stage of human life. Nowadays Deep Learning (DL) based system could aid physicians for
providing second opinion in patient’s disease treating. In this work, human Deoxyribo Nucleic Acid
(DNA) sequence is analysed using Deep Neural Network (DNN) algorithm to predict the HD disease.
The main objective of this work is to identify whether the human DNA is affected by HD or not.

Human DNA sequences are collected from National Center for Biotechnology Information (NCBI)
and synthetic human DNA data are also constructed for process. Then numerical conversion of human
DNA sequence data is done by Chaos Game Representation (CGR) method. After that, numerical
values of DNA data are used for feature extraction. Mean, median, standard deviation, entropy,
contrast, correlation, energy and homogeneity are extracted. Additionally, the following features such
as counts of adenine, thymine, guanine and cytosine are extracted from the DNA sequence data itself.
The extracted features are used as input to the DNN classifier and other machine learning based
classifiers such as NN (Neural Network), Support Vector Machine (SVM), Random Forest (RF) and
Classification Tree with Forward Pruning (CTWFP). Five performance measures are used such as
Accuracy, Sensitivity, Specificity, Precision and F1 score. DNN, NN, SVM, RF achieve 100%
accuracy and CTWFP achieves accuracy of 87%.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
64 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

126. DELAY OF NETWORK ISSUES AND CHALLENGES


S. KAVITHA1, Dr. R. KANIEZHIL2
1Research scholar(P.T), Department of Computer Science, Loyola College of Arts and Science College,
Periyar University.
2PRINCIPAL, MIT College of Arts &Science for Women, Musiri

The demand for improved and more rapid communication is growing because of the
widespread use and advancement of wireless communication in today's world. People's
need to send data as quickly as possible creates an automatic problem with spectrum
shortage. The network is heavily utilised during this period, resulting in increased
network traffic and resource strain. The utilisation of the network is delayed as a result.
The node became busy for the reasons mentioned above, which led to traffic. To spread
the workload and ensure that each node is balanced in this scenario, the load balancing
technique is used. However, the use of wireless communication has grown in recent
years, and load balancing is no longer sufficient to prevent traffic and impede network
performance.

127. IMPLEMENTATION OF DATA INTEGRITY EVALUATION PROCESS IN


CLOUD COMPUTING
Dr.R.Poorvadevi1
Assistant Professor, Department of CSE,
SCSVMV University, Kanchipuram
Tamilnadu, India

M.Tejasri2
UG Student, Department of CSE
SCSVMV University, Kanchipuram
Tamilnadu, India

N.Ramya3
UG Student, Department of CSE
SCSVMV University, Kanchipuram
Tamilnadu, India

DML stands for Distributed Machine Learning. One of the most important AI technologies is DML
(distributed machine learning). Nonetheless, in the current distributed machine learning arrangement,
data integrity isn't taken into account. However, if network attackers alter or delete the data, the data
will be falsified. As a result, it's vital to maintain data integrity in the DM. It proposes a distributed
machine-learned ness initiates data integrity checking approach to verify that the training data is
correct. To begin, it recommends using a Provable Data Possession (PDP) selection checking approach
to guarantee data integrity. As a consequence, the DML-DIV strategy will be able to withstand
manipulation and fraud attacks. Second, as part of the TPA verification procedure, researchers
generate a unique integer known as the blinded variable and utilize the discrete logarithm problem
(DLP) to build proof and ensure data security. It uses two-step authentication and identitybased
cryptographic key generation technology to activate the data possessor's public/private pair of keys.
As a result, our DML-DIV method may be able to address the important escrow issue while also
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
65 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

cutting document maintenance costs. Lastly, Finally, a thorough theoretical examination is carried out,
with formal theoretical analysis and practical evidence confirming the DML-DIV system's safety and
efficacy.

128. A REVIEW ON IMAGE CLASSIFICATION USING DEEP LEARNING


Anand Vijay Rajsri1, Dr. Abhishek Gupta2

1,2 Shri Mata Vaishno Devi University,India

Deep learning is currently an interesting topic in machine learning and there are many benefits
associated with Convolutional Neural Networks (CNN). A wide range of computer vision tasks have
been successfully completed by CNNs trained with deep learning algorithms. A CNN has shown good
performance in many areas, such as image processing, classification with the continuous development
of deep learning technology. CNN has recently received awards from image recognition and
classification competitions, providing good results compared to other networks. We summarize the
various CNN approaches that have been used to classify images. Furthermore, we focus on the optimal
configuration of these deep learning approaches according to the quality of the overall result. The
review concludes by describing the challenges of deep learning in image classification as well as a
future direction of research. The evaluation shows that deep learning is likely to remain the dominant
approach to image classification.

129. GIS-BASED QUANTITATIVE ASSESSMENT OF PUBLIC GREEN SPACE


DISTRIBUTION IN LUCKNOW CITY, INDIA
Jyoti Yadav1, Niruti Gupta2
1&2 Malaviya National Institute of Technology Jaipur

Green and blue spaces are fundamental for urban settlements to maintain the ecosystem quality.
However, public green spaces are crucial in enhancing the quality of life of citizens. Rapid
urbanization has imposed tremendous pressure on available land resources and led to the
encroachment of existing open and green spaces within and around cities. Consequently, the per capita
green in cities is reducing across the globe and pressure on public green spaces has increased. Most
developing cities are unable to fulfil the green space norms defined by their own. The study derives
the per-capita space requirement for publicly accessible green for million-plus cities in India. Further
analyses the per capita availability of public green space to assess the service level gap in Lucknow
city. The results show that the areas with higher density have lesser per capita share, whereas areas
with lower density have comparatively higher per capita public green space.

130. DESIGN AND IMPLEMENTATION OF U-SLOT MICROSTRIP PATCH


ANTENNA USING CO-AXIAL FEEDING TECHNIQUE FOR WLAN APPLICATIONS
1st A.Dineshkumar , 2nd K.Immanuel , 3rd Mr. T. Siva, 4th Mr. D. Suresh
Dept of Electronics and Communication Engineering St.Joseph’s Institute of Technology
Chennai, India

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
66 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

U-slot patch antenna design and implementation are discussed in this paper for 5.5GHz WLAN use.
The VSWR and S11 of this suggested construction, which is based on FDTD techniques to attain the
desired specification, are computed using the Computer Simulation Technology (CST) microwave
studio. The maximum bandwidth while utilizing coaxial feed is 260 MHz, which corresponds to the
WLAN frequency range of 5.36-5.62 GHz, and at its center resonant frequency, the gain is 5.3 dB.
This antenna is designed to be used in conjunction with the coaxial feed antenna. In order to obtain a
stable VSWR and low return loss, a frequency band adjacent to the present system must be used.

131. EVALUATION OF CORE POINT DESCRIPTORS ENFORCED IN THE


PEDESTRIAN IDENTIFICATION IN LOWER QUALITY IMAGES
Aswathy RH1 ,Dinesh Arjun2, Hari Prasath3, Jaichiddharth4
Assistant Professor1, Department of computer science and engineering, KPR Institute of engineering and
Technology,Coimbatore,Tamilnadu, India
Student2,3,4,Department of computer science and engineering, KPR Institute of engineering and
Technology,Coimbatore,Tamilnadu, India

Pedestrian identification is an inexhaustible and sufficiently large task in any hyper intelligent
videotape monitoring, as it supports abecedarian information for a more in-depth understanding of the
videotape footage. Because of the possibility of perfecting safety systems, it contains an egregious
extension to automotive operations. This is available as an ADAS option from a number of
automakers. The pedestrian identification network was trained using images of pedestrians and
nonpedestrians. The trainPedNet.m coadjutor script is used to train this network in Computer Vision.
The sliding window method reduced the size of the image patches to (64*32). The patch dimensions
are derived from a heatmap that depicts the dispersion of pedestrians in the images in the data set. The
patch dimensions are derived from a heatmap that depicts the dispersion of pedestrians in the images
in the data set. It denotes the absence of pedestrians at various scales and locations in the images.
Patches of pedestrians closer to the camera are cut and processed in this illustration. Non-Maximal
Suppression (NMS) refers to the patches that have been obtained in order to combine them and display
entire pedestrians. The composition focuses on the achievement of the linear binary pattern (LBP)
abstract background fluctuations capturing and Histogram of Oriented Gradients (HOG) alternatives
with altered parameters to categorising is attained by Support vector machine Classifier in this
evaluation.

132. IN SILICO INTERACTION STUDIES OF SALACINOL WITH INHIBITORS OF


IAP PROTEINS
Anitha M 1, Mahendran Radha1*, Ram kumar2

1Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.

*Department of Bioinformatics, School of Life Sciences, Professor & Head, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
67 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

2Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.

Salacia reticulata is an important medicinal plant, is widely distributed in some parts of the
subcontinent of India. The plant possesses bioactive compound salacinol which is proved to have
antitumor activity and is confirmed through various pharmaceutical studies. Apoptosis plays a key
role in the regulation of tissue homeostasis. Apoptosis, triggered by exogenous and endogenous
stimuli such as ultraviolet radiation, oxidative stress, and genotoxic chemicals is a crucial phenomenon
within biological systems. DNA damage activates and stabilizes p53 in the nucleus and cytoplasm and
regulates other proteins that stimulate intrinsic and extrinsic apoptotic pathways. Malfunctioning of
the apoptotic pathway may cause diseases like cancer, neurodegenerative and autoimmune disorders.
Recently, potent apoptosis inducing compounds associated with human health have been recorded that
prevent tumor promotion, progression, and the occurrence of cellular inflammatory responses. Certain
drugs are being employed in therapy to induce apoptosis for the treatment of cancer and non-cancerous
cells. The Inhibitors of Apoptosis (IAP) are a family of functionally and structurally related proteins,
which serve as endogenous inhibitors of programmed cell death. In the current study, salacinol was
analyzed and subjected to pharmacokinetics screening. An attempt was made to study the interaction
between three IAP proteins (BIRC5-3UIH, 3UII, 3UIK) with salacinol using Auto dock software.
Salacinol was found to have the best interaction with the IAP target protein.

133. IN SILICO SCREENING OF SNP'S IN PRION PROTEIN AND


COMPARATIVE STUDIES BETWEEN PHYTOCHEMICAL COMPOUNDS THAT
INHIBIT PRION PROTEIN CAUSING NEURO-DEGENERATIVE DISEASES.
Anitha. M1, Mahendran Radha1*, Dhanaya2, Jeyabaskar Suganya3

1Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.

*Department of Bioinformatics, School of Life Sciences, Professor & Head, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.

2Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.

3Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.

The neurodegenerative diseases are highly fatal and they are characterized by the aggregation and
deposition of the misfolded prion protein (PrP) in the brain. The prion like prionoids leads to a variety
of neurodegenerative diseases in humans as well as in animals. Prion protein is active in the brain and
several other tissues which are made by receiving instructions from the PRNP gene. Prion diseases
are progressive, fatal, affect the structure of the brain or other neural tissue, and lack effective
treatment. Hence there is an urgent need to develop new and more effective therapeutic strategies to
combat these fatal diseases. The main objective of the current study is to identify mutated SNP and its
position which is responsible for the main cause of the disease. We have predicted the protein stability,
Amino acid function, Secondary structure of the amino acid, Mutated prion protein Homology
modelling, and analysis of Protein 3D structure. Through the literature survey, we have identified
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
68 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

phytochemical compounds from medicinal plants which possess pharmacological activities to cure
neurodegenerative disease. And we have also retrieved few currently used synthetic compounds which
are used for the treatment of neurodegenerative disease. Both the set of compounds were further
analysed for Molecular docking against the target prion protein. The docking results and comparative
docking studies reveal that the natural compounds exhibit the best binding energy than the synthetic
compounds. Natural compounds are more effective in the treatment and cure of various
Neurodegenerative diseases without any side effects.

134. MULTI-OBJECTIVE VIRTUAL MACHINE PLACEMENT USING ORDER


EXCHANGE AND MIGRATION ANT COLONY SYSTEM ALGORITHM
Saripalli krishnaveni1 , Arundhathi Lakkireddy2, and S Vasavi3*,4A.Anu Gokhale
1,2,3Department of Computer Science & Engineering, VR Siddhartha Engineering College,
Vijayawada, India
4 Illinois State University, Normal, USA

Order Exchange and Migration Ant Colony System (OEMACS) and Ant Colony System OEMACS
approach based on ACS that finds solutions by combining order exchange and migration local search
strategies, was developed after examining the ant colony system's (ACS) promising performance for
combinatorial issues. The ACO algorithm, which is regarded as best approach solving for virtual
machine placement (VMP) problem, is capable of significantly reducing the number of active servers
from a optimization standpoint. These bio-inspired algorithms help in solving VMP problem. Using
the pheromone deposition method, artificial ants are guided to the feasible solution in ACO. It also
arranges virtual machines in a way that reduces resource waste. This strategy is used on servers with
homogeneous and heterogeneous VM sizes. The VMP is implemented using the ACO algorithm and
OEMACS, and a comparison is drawn between them that shows their efficiency in terms of execution
time and Energy Conserved

135. EFFICIENT DESIGN OF SRAM CELL USING 90 NM TECHNOLOGY


MOHIT GARG
Electronics and Communication Engineering
Galgotias College of Engineering &Technology
Greater Noida, INDIA
Hilal Ahmad Mir
Galgotias College of Engineering & Technology
Greater Noida, INDIA
HARSHIT CHAUDHARY
Electronics and Communication Engineering
Galgotias College of Engineering &Technology
Greater Noida, INDIA
Mr.Amit Gupta (Professor)
Galgotias College,of Engineering & Technology ,Greater Noida, INDIA
NIKHIL KUMAR
Electronics and Communication Engineering
Galgotias College of Engineering & Technology
Greater Noida, INDIA

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
69 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Now a day, low power and high-speed SRAMs have become the discriminatory part of many VLSI
chips. This is especially true for microchips, where on-chip reserve sizes are constantly evolving to
expand the growing diversity in processor speeds and Cache memory. SRAM (Static Remote Access
Memory) is used as fast cache memory and is used to speed up the processor allocation and visual
memory connector. In high-speed PCs, SRAM memory is essential for improving performance speed
and DRAM is used as part of Primary Memory where Crowding is more important than Speed.

136. THIOPHENE AS A GAS SENSOR FOR THE ADSORPTION OF CARBONYL


SULFIDE: DFT CALCULATIONS
HARIPRIYA P a , AMRUTHA R b , CHANDRAN P c
a Research Scholar, Bharathiar University, Coimbatore, PIN-641046, Tamil Nadu, India b
Department of Physics, KCG College of Technology, Rajiv Gandhi Salai, Karapakkam, Chennai, PIN-
600097, Tamil Nadu, India
c Madras Christian College, Tambaram East, Tambaram , Chennai, PIN-600059, Tamil Nadu, India

Gas sensing ability of Thiophene with Carbonyl sulphide (COS) is investigated using hybrid
functional DFT B3LYP/6-31+G(d) level of theory. The interaction energy, the counterpoise corrected
energy and the charge transfer through Mulliken and Natural bond orbital ( NBO ) analysis between
the analyte and the monomer reveal the gas sensing parameter of thiophene. When carbonyl sulfide is
exposed to thiophene, it alters the electronic charge concentration which changes the electrical
properties of thiophene. This opens the possibility of thiophene as an efficient gas sensor. The results
are supported by UV-vis spectroscopic analysis . The reduction in the band gap for thiophene with
COS than that of thiophene enhances its electrical conductivity that makes it suitable in the design of
organic semiconducting devices. By COS adsorption on thiophene, the gas sensing ability is proved
which predicts thiophene as an excellent gas sensor to replace the traditional solid state sensor.

137. RASPBERRY PI BASED READER FOR BLIND


Pratik Dete1 , Rahul More2 , Omkar Khandekar3
Department of Electronics and Telecommunication Engineering
Rajiv Gandhi Institute of Technology, Mumbai

The Braille machines are expensive and as a result are not accessible to many. In particular, there is a
need for a portable text reader that is affordable and readily available to the blind community. The
concept of automatic document reader means blind reader is for visually impaired peoples. There are
millions of visually impaired peoples in the world. Reading is one of the major necessities of visually
impaired people. In this paper we designed system is a portable, low-cost, reading device made for
the blind people. Also overcomes the limitation of conventional Braille machine by making it
affordable for the common masses.

We proposes a smart reader for visually challenged people using raspberry pi. This system consists of
a camera interfaced with raspberry pi which accepts a page of printed text. This system uses OCR
technology to convert images into text and reads out the text by using Text-to-Speech conversion.
This system supports audio output via Speakers as well as headphone.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
70 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

138. TEMPERATURE PREDICTION USING MACHINE LEARNING ALGORITHM


Shanmathi.E, and G.B.Hema Malini, SDNB Vaishnav College for Women.

Weather forecasting is the prediction of what the atmosphere will be like in a specific place by using
technology and scientific knowledge to observe the weather. This paper aims to predict temperature
using linear regression model, random forest regression model and support vector regression model.
This study was limited to collecting and analyzing datasets that contained missing data, as the missing
data can immensely hamper the analysis. The data collected is incomplete and the temperature
prediction model is used to refine the incorrect and missing data. The random forest regression model
is used to predict the average temperature of that particular year we get the predicted temperature with
an accuracy of 99.58%.

139. CLASSIFICATION OF PADDY AND TOMATO CROPS DISEASES DETECTION


USING CNN
1 Maamidi Yaswanth Kumar Reddy
Department of CSE
Kalasalingam Academy of Research and Education
Anand Nagar, Krishnankoil, India.
2 Kedari Lakshmi Narasimha Department of
CSE
Kalasalingam Academy of Research and Education
Anand Nagar, Krishnankoil, India

Paddy is one of the major cultivated crops in India which is affected by various diseases at various
stages of its cultivation. Tomato is an a major crop in India that every year production is nearly 2744.32
thousand metric tonnes. It is very difficult for the farmers to manually identify these diseases
accurately with their knowledge.

Recent developments in Deep Learning show that Automatic Image Recognition systems using
Convolutional Neural Network (CNN) with Transfer Learning (TL) and Support Vector Machine
(SVM) models can be very beneficial in such problems. we have used Transfer Learning to develop
our deep learning model. The proposed CNN architecture is based on MobileNet and is trained and
tested on the dataset collected from fields and the internet.

140. DEEP LEARNING AND SWARM INTELLIGENCE BASED SYSTEM FOR


SMART AGRICULTURE USING WIRELESS SENSOR NETWORKS
Kaniga.B
M.E-STUDENT, Dept. ECE,
Paavai Engineering College (Autonomous), Tamil Nadu, India
Dr.M.Sudha
M.E., MBA., Ph.D., HEAD OF THE DEPARTMENT, Dept. ECE,
Paavai Engineering College (Autonomous), Tamil Nadu, India
Mr.Ravisankar Kandasamy
M.E., (Ph.D)., Asst. Professor, Dept. ECE,
Paavai Engineering College (Autonomous), Tamil Nadu, India

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
71 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

The WSN (Wireless Sensor Network) based agricultural drainage management system is a
convergence technology to enhance agricultural production of crops from storm control, erosion
control and water table control. In addition, implementing smart agriculture, through the convergence
technology allows to determine the requirement of water resources, real-time monitoring of the field
and support farmers in decision process. In addition, sensors help in collecting information on
circumstances like level and flow of water in drainage area, soil moisture content and rainfall
condition. We presented the survey about the WSN based smart agriculture and its techniques to future
along future enhancement. The work further extends with the deep learning approach of analysing the
data collected from the level and flow sensors and camera. The CNN based design can improve the
performance of the system. The proposed ideation combines the swarm intelligence and CNN for
better performance.

141. SIGN LANGUAGE RECOGNITION USING DEEP LEARNING


Anushka Ray, Shahbaz Syed, S. Poornima, and M. Pushpalatha
Department of Computing Technologies, School of Computing,
SRM Institute of Science and Technology, Kattankulathur-603203, Chengalpattu, Tamil Nadu, India

Sign language is the primary language of the people with speech and hearing impairment. Hearing
impaired people use sign language to express themselves, participate in conversations, learn, and live
as normal a life as possible. When deaf and dumb persons try to converse in sign language with those
who aren't familiar with it, a problem occurs. This is where modern technology can step in. Although
many existing projects have proposed methods to alleviate the problem but most of these have used
external sensor or certain algorithms that do not work well under certain conditions like variation in
skin color, inclusion of facial data and similarity between few signs and gestures. In our project we
have used MediaPipe to solve the problem of variation in skin color as it is a very accurate hand
tracking framework by Google. We have also created 3 sets of customs datasets to train 3 different
deep learning models — 2 of these models are used specifically used for predicting particular groups
of letters which are similar to each other. This fixes the issue arising when similar signs are
encountered. The propose prototype can be used to help educate the elementary school children using
which they can learn to fingerspell the American sign language alphabets and string them into basic
words and learn them in a picturized manner. At the end our prototype should be able to detect the
sign alphabets from the live video, print them on screen and display the image of the words formed
using the sign alphabets.

142. DETECTION OF OBJECTS USING MACHINE LEARNING


K.Muni Vardhan
Department of Computer Science and engineering
Kalasalingam Academy of Research & Education
Krishnankovil, TamilNadu

Dr.A.Sarvanan
Associate professor
Department of Computer Science and engineering

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
72 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Kalasalingam Academy of Research & Education


Krishnankovil, TamilNadu

M.Girish Reddy
Department of Computer Science and Engineering
Kalasalingam Academy of Research & Education
KrishsnanKovil, TamilNadu

G. Mahesh
Department of Computer Science and Engineering
Kalasalingam Academy of Research & Education
Krishanakovil, TamilNadu

Due to object detection’s close relationship with video analysis and image understanding, it has
attracted much research attention in recent years. Traditional object detection methods are built on
handcrafted features and shallow trainable architectures. Their performance easily stagnates by
constructing complex ensembles which combine multiple low-level image features with high-level
context from object detectors and scene classifiers. With the rapid development in deep learning, more
powerful tools, which are able to learn semantic, high-level, deeper features, are introduced to address
the problems existing in traditional architectures. In this paper, we propose a two-step solution to this
problem. In the first step, our goal is to provide a model to optimize memory usage and, in the second
step, we propose a multi-thread approach that uses YOLOv3 to perform real-time object detection on
multiple, concurrent, live streams on a single GPU. In this approach, GPU resources are optimally
used. The proposed approach is evaluated on a public dataset and the result shows improvements in
performance by an average of 12% in Central Processing Unit (CPU) usage and 13% in frames per
second (FPS) compared to the YOLOv3.

143. CODE COVERAGE - STUDY ON APPLICATIONS OF CODE COVERAGE


METRICS FOR IMPROVING TEST EFFECTIVENESS
Kavitha Chellappan1, Dr MK Jayanthi Kannan2
1Research Scholar, Department of Computer Science, JAIN( Deemed to be University), Bangalore
2Professor, Department of Computer Science, Jain ( Deemed to be University, (Karnataka), INDIA

Code coverage represents the percentage of software code exercised by the test system. The
aforementioned “test system” is expected to include all tests designed to evaluate the quality of the
software code. Code coverage assessment is one of the most objective indicators that can accurately
illustrate the effectiveness of the tests in a project. Besides the primary intent to measure to test
effectiveness, coverage metrics data can be leveraged for additional purpose: improve test
effectiveness and/or to also boost test efficiency. Significant research and practical application of
repurposing the coverage metrics has been ongoing in the last few decades. The core of such
applications centers around Process and Software Quality enhancements. Such applications deploy a
variety of software tools and techniques, including static analysis tools(such as cppchecker, Coverity)
, data integration techniques (to combine data from software source control system, defect
management system and test antifactory) , business intelligence tools and techniques , and machine

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
73 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

learning algorithms to percolate undiscovered patterns. This paper reviews the landscape of such
applications and identifies opportunities for areas that warrant further research.

144. DETECTING SKIN CANCER USING DEEP LEARNING


Dr.T.C.Kalaiselvi,R.Niventhra, R.Praneshkumar, P.Palanivel
Department of Electronics and Communiction
Kongu Engineering College
Perundurai, ErodeTamil Nadu

Skin cancer is one of the most common cancers that affects people all over the world. The three most
dangerous types of cancer that are caused by broken DNA and result in death. Damaged DNA causes
cells to expand uncontrollably, and the rate of growth is currently increasing rapidly. The
interpretation of these images is difficult due to the difficulties of the various shapes and sizes of the
lesions. One of the most difficult aspects of developing a good automatic categorization system is the
absence of large datasets. To distinguish the seven various types of moles in skin cancer, the suggested
method uses a deep convolutional neural network. The dataset, a large collection of dermartoscopic
images, was utilised in trials to increase performance using data augmantation techniques.
Melanocytic nevi (mv), Melanoma (mel), Benign keratosis-like lesions (bkl), Basal cell carcinoma
(bcc), Actinic keratoses (akiec), Vascular lesions (vas), and Dermatofibroma are the seven forms of
moles (df). The VGG algorithm is used to train and test the dataset images. The shown findings are
ideal for achieving high classification accuracy and lower false negatives when employed with the
DenseNet network. The models perform well in large dataset classification and can discriminate
between the seven categories of moles in a dataset.

145. COVID-19 INDOOR SAFETY MONITORING SYSTEM USING MACHINE


LEARNING
Dr.T.C.Kalaiselvi,R.Niventhra ,R.Praneshkumar ,P.Palanivel
Department of Electronics and Communiction,
Kongu Engineering College
Perundurai, Erode
Tamil Nadu

The Covid-19 pandemic is causing a global health epidemic. The most powerful safety tool is to
wear a face mask in public places, schools, supermarkets to reduce the spread of Covid-19. There are
many Convolutional face recognition technologies to distinguish effective photographic imagery to
monitor face mask detection. Therefore, it is very important to improve the performance of existing
detection methods in the existing system. In the proposed input of the data set number increases to
improve the maximum range of accuracy. The proposed method is used to determine the body
temperature, face mask and social distance maintenance using advanced machine learning methods.
Using the EM -18 RFID scanner human data such as temperature value, face mask identification and
public distance detection are collected. It is used to indicate the state of a person's health in a cloud
platform. The wireless temperature sensor is used to detect the body temperature of a person using
MLX90614 without anyone. Raspberry Pi integrated with Raspberry pi camera is used to monitor face
mask detection and community distance. Raspberry pi captures an image and detects with the
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
74 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Convolutional Neural Network algorithm if a person is not wearing a mask, not following a social
distance. So, the authorities have to monitor the human condition in the cloud platform. By applying
this concept, the spread of Covid-19 can be greatly reduced and it is easier to identify people with
Covid-19 symptoms.

146. SENTIMENT ANALYSIS ON USER REVIEWS AND TWITTER DATA TO


PREDICT VEHICLE SALES
Nithiavathy.R
Department of Computer Science and Engineering
Sri Krishna College of Technology
Coimbatore,India
Blessy A V
Department of Computer Science and Engineering
Sri Krishna College Technology
Coimbatore,India
Kavya R
Department of Computer Science and Engineering
Sri Krishna College of Technology
Coimbatore,India

Because of the growth of social media, writing comments or expressing thoughts on products online
is now simpler than ever. Data from user evaluations might be one of the most important sources for
anticipating vehicle sales.Sentiment Analysis is another way to understand if the user is satisfied with
the product which will help the manufacturer to improve the features in the upcoming release.User
reviews play a vital role in analysis and predict which product will have much production and sales in
future.In this paper a set of algorithms are used to predict the sentiment analysis including the Naive
Bayes,Logistic Regression and RandomForestClassifier. The categorization and prediction will be
based on user-defined reviews and data from Twitter.

147. CHILD ADOPTION BASED ON FACIAL FEATURES AND SKIN COLOR


Venkatesh V
Dept of computer science and
Engineering
Sri Krishna college of technology
Coimbatore, India

Aathi Vasanthan V
Dept of computer science and Engineering
Sri Krishna college of technology
Coimbatore, India
Daraneeswaran M
Dept of computer science and Engineering
Sri Krishna college of technology
Coimbatore, India
Dharaneeish S

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
75 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Dept of computer science and Engineering


Sri Krishna college of technology
Coimbatore, India

Matching is the process of collecting a young person's down and out enactment, accompanying
skillfully anticipated persons. It is a main stage superior to landing at a maintenance resolution.
Matching includes choices that concede the possibility to endlessly change a youth’s growth in an
adoptive classification. It is a blame usually pretended by a crew of artists loyal to the care and welfare
of youth, including psychologists, friendly traders, and jurists. Matching is a weighty and complex
task that grants permission to influence negative results for two people: an adoptive classification and
an adolescent if an inappropriate competition is created. This White Paper examines, by virtue of what
creative data processing can do, how it can considerably embellish the ratification process.
Specifically, what it will show is that there is a need for a very large size of culture in the corresponding
philosophy of a new order to mirror the complex process that happens through uniformly cruel
judgement and interpretation. When created and achieved correctly, creative equal electronics may be
very valuable, more conversant selections that bring about better effects and a sleeker and
understandable maintenance process. Using countenance treat science, the countenance in the face of
the adopting father and mother is written, and the kid whose equal is equate is recognized and assigned
to the ruling class.

148. SOCIAL MEDIA ADVERTISEMENT RESULT ANALYSIS


Nishitha Velagala
Computer Science and Engineering B. Tech of SRM Institute of Science and Technology Chennai, India
M Parijat Chandra
Computer Science and Engineering B. Tech of SRM Institute of Science and Technology Chennai, India
Dr. Poovammal E
Department of Computing Technologies of SRM Institute of Science and Technology Chennai, India

Our research focuses on the issue of social media advertisement, which refers to the placement of
advertisements based on the social information and behaviours of individual users. As social network
services (such as Instagram, Facebook, and Twitter) become the primary venue for social interactions,
social network sites now account for more than 20% of all internet advertisement. The need of
advertisement is getting more and more important because of the competition that companies are
facing in their respective sector. We have done our analysis by understanding the individual
information with their behaviour on networking sites. We are presenting the analysis of outcome for
any advertisement data whereas our database consists of three parameters such as age, salary and
purchase or not. And we are predicting the outcome for other users. We have used and compared
various machine learning models and compared the accuracy of those models. For this research we
have used a dataset taken from the Kaggle website but this model can be used for any dataset so this
model can be used widely by anyone to get the result and to understand the behaviour of users. Prior
work that we have gone through is based on a click through model. Which predicts whether the user
will check or not but this model is focused on whether the user will purchase or not which is totally
based on the outcome of the advertisement. Our research will help the companies to understand the
behaviour of users and with the help of the data they can make changes to their product and
advertisement in order to accurately reach out their target audience which will help them a lot because
to reach their consumer and to expand the reach among the people is what any business is all about.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
76 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

149. DETECTION OF VIRULENT MESSAGES ON PROPOSED DATASET WRITTEN


IN CODE-MIXED HINDI-ENGLISH LANGUAGE USING NLP TECHNIQUES
Nirav Agarwal1, Harshvardhan Arvind Singh1, Anita Ramalingam1
1SRM Institute of Science and Technology, Kattankulathur

Social media as a medium of communication has opened countless possibilities for individuals around
the globe to express their opinions on various topics ranging from politics to entertainment, thus
reducing the gap in the accessibility of information. However, this has also led to social media
becoming a hub for spreading hateful messages. These virulent messages spread online result in the
rise of cases of cyberbullying, leaving an enduring impact upon the victims. Manually classifying and
reporting these messages is a challenging task and has therefore created an interest in the research
community to incorporate machine learning-based techniques to ease up the hand-operated process.
The study's goal is to play a small auxiliary role in the prevention and ultimate eradication of
cyberbullying. The proposed work in this research primarily focuses on the users from the Indian
subcontinent by experimenting with Code-Mixed Hindi-English language. The study achieves this by
performing the task of developing a Code-Mixed Hindi-English hate speech dataset containing 4014
tweets, out which 2000 tweet contain hate, using the publically available tweets from the Twitter
platform and, furthermore, utilising the created data to fine-tune a collection of pre-trained deep
learning models.

150. INTELLIGENT TRAFFIC FLOW USING MACHINE LEARNING


Anirudh. P
SRM Institute of Science and Technology
Vishnu Vijay
SRM Institute of Science and Technology
T Senthil Kumar
SRM Institute of Science and Technology

Traffic congestion is a serious problem of rising concern especially in India where the population is
already over a billion and the common choices of transport for commuting being a four wheeler and
a two wheeler. India is urbanizing at a great pace and it is competing with the fastest growing countries
in the world which also resulted in high vehicular growth. In order to tackle this some research has
been conducted on the existing methods and technologies for relieving traffic congestion and was
identified with a lot of improvement to make. Hence the main aim is to make it now intelligent enough
to take into consideration accidents/breakdowns, clearing way for ambulances and firetrucks and
better reliability of the existing system in detecting vehicles. Using the live feed from cameras with
image processing, deep learning and an algorithm with a timer logic for the signals, this project tackles
the issue.

151. DESIGN AND DEVELOPMENT OF SOLAR WATER PUMP WITH DIFFERENT


TIME SLOTS FOR POWER SAVING
Balaram Jagatha1
Electronics and Communication Engineering, Vardhaman college of Engineering Affiliated by JNTU
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
77 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Shamshabad, Hyderabad, India


Sathwik Rapala2
Electronics and Communication Engineering, Vardhaman college of Engineering Affiliated by JNTU
Shamshabad, Hyderabad, India
Krishna Chaithanya. J
Electronics and Communication Engineering, Vardhaman college of Engineering Affiliated by JNTU
Shamshabad, Hyderabad, India

From the olden days, we have been using the non-renewable resources like coal for our needs which
is leading to the exhausting of these resources. Technology has developed to such an extent that it has
become helpful for us in all aspects of life. By utilizing this technology we can use the renewable
energy resources and reduce the usage of nonrenewable resources for achieving a sustainable
development. The photo voltaic cells convert the solar energy into electrical energy and this energy is
stored in batteries to run the water pump during the day time. If a machine is to be switched off after
operating for few minutes, it becomes difficult and many times we don’t remember to turn off the
system after the prescribed time. Our project gives a solution for not only saving the energy but also
builds a brilliant framework to reduce the wastage of water and increment the beneficial of the product.

152. DETECTING PASSIVE ATTACKS IN FINGERPRINT SPOOFING USING


CONVOLUTION NEURAL NETWORK
Mr.R.RAJA SEKAR, G.Poojitha Sree Vandana, C.Glory Devakirubai, G.Ravindra Babu
Computer Science and Engineering, Kalasalingam Academy of Research and Education

This paper endorse the idea of “Detecting Passive Attacks in Fingerprint Spoofing Using Convolution
Neural Network”. More recently, in the field of cybercrime getting fake fingerprints is a daunting task
in any developed country. Biometric authentication grows in many areas such as online banking,
private file locks, etc. Where fingerprint detection is an important factor used to obtain analysis of
fingerprints. By using Convolutional Neural Network Algorithm to detect the liveness of fingerprint
whether fingerprint is real or fake. This paper will explain the design and features of detection of
passive attacks in fingerprint spoofing using convolutional neural networks. Furthermore, we discuss
the major research challenges and future work that need to be addressed in this active field of
fingerprint liveness detection.

153. PREDICTION OF COVID-19 & PNEUMONIA BY USING CONVOLUTIONAL


NEURAL NETWORK AND DEPLOYMENT BY USING THE WEB FRAMEWORK
A. Antonidoss1, Bishal Sarkar2
1&2Dept of CSE, Hindustan Institute of Technology & Science, Chennai, Tamil Nadu

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
78 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

The symptoms of covid-19 and Pneumonia are similar. Steps must be taken to distinguish between
covid-19 and other types of pneumonia patients. In this paper a model of Convolutional Neural
network(CNN) is presented by using Tensorflow, keras, numpy and Matplotlib to detect covid-19,
Pneumonia, both covid-19 & Pneumonia and normal Patients. It is based on classification which is a
supervised learning. There are four classes, they are normal, covid-19, Pneumonia, both covid-19 &
Pneumonia. The paper is deployed by using by using the django framework in pycharm. It is a example
of chest x-ray image classification by using tensor flow, Matplotlib, keras and numpy library and
alexnet.

154. TEMPERATURE CONTROLLED DC FAN USING SOLAR ENERGY


Niharika Ganji
Electronics and Communication Engineering
Vardhaman College of Engineering Hyderabad, India

Shriya Gandreti
Electronics and Communication Engineering
Vardhaman College of Engineering Hyderabad, India

Mr. T. Rama Krishnaiah Electronics and Communication Engineering


Vardhaman College of Engineering Hyderabad, India

Automated control is a vast area of technology, whose prime objective is to build control strategies to
increase functioning capabilities and efficiency when they are used on a system. The remarkable
feature of automation is that it reduced the user’s workload. An example of those utilities is the
Automatic fan. Fans are generally designed with control equipments, based on speed demands.
Generally, when the heat is high, the fan is switched to rotate at a higher speed and at cooler or lower
surrounding temperatures, the fan will work at a slower speed, which is mostly done with the help of
a regulator. Therefore, in this paper, an automatic control design is presented for fan speed. A circuit
consisting of a temperature sensor along with a microcontroller inside, a DC motor, and some
electronic components is used and implemented to automatically change the speed of the fan. As an
extra feature, the LCD screen is also placed which is used to display the temperature and fan speed at
a particular moment. When the temperature of the detected environment exceeds the threshold value,
the fan starts up, and the temperature drops. The fan will remain on until the temperature drops below
the threshold value. Automation of fan speed saves time and maintains an always comfortable
environment.

155. SECURED DATA TRANSMISSION FOR SMART GRID SYSTEM USING


BLOCKCHAIN TECHNOLOGY WITH A TRUSTED GAMING TOKEN HONEYPOT
ALGORITHM
Deeptha R. 1*, Rajeswari Mukesh2
1Assistant Professor,
Department of Information Technology,
SRM Institute of Science and Technology, Ramapuram.
2Professor and HOD,
Department of Information Technology,
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
79 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

SRM Institute of Science and Technology, Ramapuram.

Implementing blockchain techniques has enabled secure smart trading in many realms including
neighboring energy trading. The information stored on the blockchain will face privacy security issues
over attackers. In this paper, a Smart contract based blockchain-oriented approach to solve the problem
of privacy leakage without restricting trading functions in smart grid is presented. The proposed
approach mainly addresses energy trading users' privacy in smart grid and screens the distribution of
energy sale of sellers deriving from the fact that various energy trading volumes can be mined to detect
its relationships with other information, such as physical location and energy usage. Then for the
purpose of secure data transmission, Conviction Diffie Hellman Algorithm (CDHA) was used for
generating the keys. Finally for detecting the untrusted user, Trusted Gaming Token Honeypot
Algorithm (TGTHA) was suggested. The whole experimentation was carried out in a MATLAB
environment. Experimental evaluations have demonstrated the effectiveness of the proposed
approach.

156. FRAUD CLAIMS DETECTION IN INSURANCE USING MACHINE LEARNING


Hritik Kalra
Dept. of Computing Science Eng., School of Computing,
SRM Institute of Science and Technology, Kattankulathur
Chennai, India
Ranvir Singh
Dept. of Computer Science Eng., School of Computing,
SRM Institute of Science and Technology, Kattankulathur
Chennai, India
Dr. T. Senthil Kumar
Dept. of Computing Technologies, School of Computing,
SRM Institute of Science and Technology, Kattankulathur
Chennai, India

Insurance fraud is an illegal activity that is deliberately done for financial gain. In the present era, this
is the prime severe problem encountered by various insurance companies all over the globe. In most
cases, some shallow or deep holes in process of fraudulent claims investigation have been identified
as a major cause. Due to this reason, the need of using computer techniques to curb fraud activities
grew as a motivation, providing not only a reliable and robust environment for customers but also
reducing fraud claims to a large scale. We presented our research by automating the assessment
process of insurance claims through various data techniques, where identification of false claims will
be automatized by utilizing Data Analytics and Machine Learning methods. Moreover, the system has
the ability to potentially develop heuristics around fraud indicators. Therefore, this model creates a
positive impact on the whole insurance industry with increased company credibility as well as
customer satisfaction.

157. PHISHING SCAM IN THE MIDST OF THE UKRAINE CRISIS


Ashok Kumar R, Rakshitha P and Nisha Setty A R, [email protected]

Phishing is a cybercrime that involves the use of virtual networks. Phishing is used to attain nefarious
goals, such as stealing money and personal information from internet users. To perform such tasks,
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
80 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

phishers use emails or SMS as bait. The rate of such crimes is rising all the time. It's essential to realize
and be informed of such a crime. Donation camps have begun to support Russia and Ukraine as a
result of the ongoing hostilities. To steal this money, scammers have established harmful websites.
They're sending out emails with these kinds of website links in them. This study outlines the recent
phishing attempts, how to protect oneself from phishing and the email patterns used by such criminals.
Machine learning algorithms are used to distinguish between phishing and authentic websites. The
accuracy of test set prediction was taken after fitting model to the training data. The Logistic
Regression, SVM, and Naïve Bayes Algorithms were outperformed by the KNN and Random Forest
Algorithms. KNN and Random Forest provided 91% and 91.96% accuracy, respectively.

158. CROP ANALYSIS AND PREDICTION USING ENSEMBLE LEARNING


Dharini Grover1, *S.Iniyan1

1Department of Computer Science and Engineering, School of Computing, SRM institute of Science and
Technology,Kattankulathur,Chengalpattu-603203,India

2Department of Computing Technologies, School of Computing, SRM institute of Science and


Technology,Kattankulathur,Chengalpattu-603203,India

Nowadays, unpredictable climate change has led to poor yields of the crops affecting their
performance and growth .Crop prediction performed in advance of the harvest, would help the farmers
adopt appropriate measures, in terms of storage, etc. It will also be advantageous for the government,
policymakers, etc. This project will help counsel the farmer in sowing reasonable crops by deploying
machine learning techniques like Ensemble learning, one of the best technologies in crop prediction.
Machine learning will help decide what crops to grow, what to do during the growing season of the
crops, after harvesting, etc. Factors like temperature, rainfall, area, etc.will be considered. Different
machine learning algorithms will be applied to support crop yield prediction research.The predictions
achieved by this system will largely help the farmers decide which crop to grow. The accuracy of
ensemble prediction is 98.9 while that of gradient boosting is 99.45.

159. PREDICTING STUDENT MARKS USING MACHINE LEARNING


GOUTHAM GK
B.Tech (CSE)
SRM Institute of Science and Technology, KTR
Chennai, India
PENDYALA REVENTH SETYA
B.Tech (CSE)
SRM Institute of Science and Technology, KTR
Chennai, India
Dr.T SENTHIL KUMAR
Associate Professor

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
81 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

SRM Institute of Science and Technology


Department of Computing Technologies
School of Computing
Chennai, India

In the realm of data mining strategies, a massive amount of computerized data is produced using a
variety of methods. An important area of education data mining development is the establishment of
students achievements predictions modelss to forecast student performance in academic institutions.
Using their prior semester grades, a prediction system has been presented. Binomial logical regression,
Decision tree, linear regression, and the KNNs classifier are used to analyze the study. This framework
would aid the student in recognizing their finals grade and improving theirs academic conduct in
orders to achieves their higher score. When a student's gradesfalls below 50%, our app sends a
message to their parents.

160. MODELING OF 2DMULTILAYER MOLYBDENUM DISULFIDE MOS2


TRANSISTOR
Dr.R.Sridevi
Department of Electronics and Communication Engineering,
M.Kumarasamy College of Engineering,
Karur-Tamil Nadu,
S.Angalaparameswari
Department of Electronics and Communication Engineering,
M.Kumarasamy College of Engineering,
Karur-TamilNadu,
D.Indhuja
Department of Electronics and Communication Engineering,
M.Kumarasamy College of Engineering,
Karur-Tamil Nadu,
D.Poovitha
Department of Electronics and Communication Engineering,
M.Kumarasamy College of Engineering,
Karur-Tamil Nadu,

Unique Atomically slight Molybdenum disulfide (MoS2) is a semiconductor material suitable for
field-effect transistors (FETs) with channel lengths of tens of microns or less than ten nanometers.

The bulk and massive band hole of MoS2 limit the level of difficulty possible in direct source-drain
in extremely short-channel semiconductors. Its molecularly slim body improves the efficacy of door
balance. Our results show that when the thickness of the MoS2 channel layer is increased, it plays a
significant role in settling and executing debasement.

161. A STUDY TO EXPLORE HINDRANCES IN IMPLEMENTATION OF DATA


MINING IN BANKS

Vivek Bhambri

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
82 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Assistant Prof, Department of Computer Science and Applications


A.S.College, Khanna

The growing size of data bases in all types of organizations is making it difficult for them to analyze
it and use it for making effective decisions well in time. In such a scenario, where making effective
and timely decisions is of utmost importance, the techniques and tools available in data mining has
proved to be an asset for the organizations. Data mining techniques are used in all types of
organizations for customer relationship management, detection of frauds and predicting future trends.
But still it is in a stage of infancy, where implementation of these techniques has to face economic,
administrative and behavioural problems. Readiness to adopt the new technology is a major issue in
the implementation of new technologies. This paper tries to explore the relationship of age and gender
with the readiness to adopt the data mining techniques in the banks with the help of association rule
mining. The analysis of the results will be fruitful for the decision makers in the banking sector to
design a strategy for the successful implementation of these techniques.

162. DESIGN & IMPLEMENTATION OF BUS TRACKING SYSTEM UNDER IOT


PLATFORM
Divya Sravani Bandi1 Electronics and Communication Engineering
Vardhaman College of Engineering Affiliated to JNTU Hyderabad Shamshabad, Hyderabad, India

Vishal Reddy Chewalla2 Electronics and Communication Engineering


Vardhaman College of Engineering Affiliated to JNTU Hyderabad Shamshabad, Hyderabad, India

Krishna Chaithanya. J3 Electronics and Communication Engineering


Vardhaman College of Engineering Affiliated to JNTU Hyderabad Shamshabad, Hyderabad, India

In the system, technologies have been demonstrated to make individual’s lives more secure and safe
every day. The proposal is developed on cutting-edge GPS technology and Internet of Things (IoT)
and employs an application to manage all the college buses, enabling students to track the movement
of buses. Additionally, daily issues such as traffic, abrupt delays, and faulty vehicle arrival and
departure incidents tend to happen, interrupting the students' and faculty’s schedules and requiring
them to wait for their particular bus arrival or otherwise attempting to miss their bus. The application
allows all of an institution's staff and students to track where each college bus is at any given time. A
GPS module has to be installed in every bus that is helpful in assisting users to locate the bus, and the
data is collected via an Android app that uses Google Maps to track each bus's travel. The location
coordinates of bus are updated every second in the application as per the current location of the bus,
paving the way for a real-time system

163. SENTIMENT ANALAYSIS OF PRODUCT REVIEW


N.Veerendra
Department of computer science and engineering
Kalasalingam academy of research and education
Krishnankovil, Tamilnadu
V.Arun Kumar Reddy
Department of computer science and engineering
Kalasalingam academy of research and education

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
83 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Krishnankovil, Tamilnadu
G.Gangadhar
Department of computer science and engineering
Kalasalingam academy of research and education
Krishnankovil, Tamilnadu
Dr.Mohad Usama
Associate professor
Department of computer science and engineering
Kalasalingam academy of research and education Krishnankovil, Tamilnadu

Social network, e-commerce sites, blogs are new emerging platforms for people to express their
opinion. These websites provide a large volume of text that can be utilized for a variety of purposes,
including sentiment analysis. The major purpose of sentiment anal ysis is to aid in the improvement
of a firm. Here NPL algorithm is used. In proposed system, NLP algorithm shows outstanding
performance. To create sentiment analysis a using the analysis of emotions, there is a need to use
polarity obtained through the reviews and finally we shown the graph based on reviews and
comparing two products reviews using natural language processing.

164. VOICE BASED EMAIL FOR BLIND USING ARTIFICIAL INTELLIGENCE


AND PYTHON
B. Bhavana1, T. Bala Bhavagna2, B. Lasya Priya3, M M Mastan Durga4
Assistant Professor1,2,3,4 Department of Computer Science and Engineering
Velagapudi Ramakrishna Siddhartha Engineering College, Kanuru

As technologies are enhancing, human beings are habituating to virtual life and virtual verbal
exchange. There are numerous methods to communicate with others through the net in this
contemporary technology. Most people always select and use the easiest manner of communique
commonly i.e., electronic mail. Electronic mail is the era that allows customers to contact others via
sending mails and additionally enables in the business global conversation. There are folks who can't
use this generation due to the fact that they're illiterate or do not have the visible capability on the
screen. So, to make this era towards visually challenged human beings, a Voice-based totally email
gadget is proposed by using Artificial Intelligence and Python. This device gives visually challenged
people the power of communication and makes them a great deal stronger and more unbiased. This
software will assist blind people to get the right of entry to e-mail much like different everyday
humans. Voice-primarily based e-mail structures use new technology as a way to be without difficulty
proper through visually challenged people.

165. PREDICTION OF DIABETES USING MACHINE LEARNING ALGORITHM


Heet Patel
Dept of Computer Science and Engineering SRM Institute of Technology and Science Chennai, India
Briskilal J
Assistant Professor
Dept of Computing Technologies
SRM Institute of Technology and Science

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
84 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Diabetes is a disease caused by elevated blood sugar levels in the body. Diabetes shouldn't really be
overlooked. If left untreated, it can cause serious complications such as heart disease, kidney disease,
high blood pressure, loss of vision, and damage to other organs in the body. Early detection of diabetes
can be treated. To achieve this goal, we use a variety of machine learning techniques to perform early
predictions of diabetes in the human body or patients for greater accuracy. Machine Learning
Techniques You can improve predictions by building models from patient datasets. Given a dataset,
this study uses machine learning classification and ensemble strategies to predict diabetes. K Nearest
Neighbor (KNN), Logistic Regression (LR), Decision Tree (DT), Support Vector Machine (SVM),
Gradient Boosting (GB), and Random Forest are abbreviations for K Nearest Neighbor (KNN),
Logistic Regression (LR). Decision Tree (DT), Support Vector Machine (SVM), Gradient Boosting
(GB), or Random Forest (RF). Compared to other process, the outcome of each model is distinguish.
Project work gives an precise or more accurate model that gives that the model can precisely predict
diabetes. Our results show that Random Forest is dominating to other artificial algorithms in terms of
accuracy.

166. RSSI BASED SAND THEFT PREVENTION


1st Dhayapulle Sai Pavan
Dept name (Electronics and Communications Engineering)
(SRMIST)
Chennai, India
2nd k.Naga Pramodh
Dept name (Electronics and Communications Engineering)
(SRMIST)
Chennai, India
3rd P.Thilak
Dept name (Electronics and Communications Engineering)
(SRMIST)
Chennai, India
4th M.K.Srilekha
Dept name (Electronics and Communications Engineering)
(SRMIST)

Cloud computing has a number of security issues, with the SAND theft attack being one of the most
significant. Existing security measures, like as encryption and decryption, are ineffective against
insider SAND theft. This study weaves a web of malicious fake expertise to prevent insider data theft
attacks. The approach is demonstrated by creating an example product based on a web blueprint that
demonstrates the usage of decoy technology. In addition to spreading disinformation through decoy
numbers, this importance puts doubt on illegal access and presents problematic considerations. As a
result, insider theft may be averted by using the Received Signal Strength Indicator(RSSI) to measure
the power received from the receiver’s returned signal.

167. A BRIEF REVIEW OF IMAGE CAPTIONING METHODS USING DEEP


LEARNING APPROACH
Rahul Kumar1, Manoj Kumar2
1,2 School of Computer Science & Engineering, Shri Mata Vaishno Devi University, India

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
85 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Recent advances in deep learning have led to an increased interest in image captioning. A caption for
an image should adequately describe the image and provide a concise description. Moreover, the
generated captions should be syntactically and semantically correct. To achieve this goal numerous
architecture and techniques have been used. The baseline architecture for captioning contains an
encoder and decoder as its components. Where Convolutional Neural Network (CNN) is tested and
trained for extracting features(encoder) from the image and Long Short-Term Memory (LSTM) is for
generating the captions(decoder). In this study, we briefly discuss the methods and architectures which
are successful and efficient in recent years. MSCOCO, Flickr30k, and Flickr8k are the prominent
datasets for captioning and are widely used. To test methods quantitatively and qualitatively various
evaluation metrics have been used. Based on the resultant score of methods on evaluation metrics we
learn and compare the efficiency of those methods in this study.

168. DETECTION OF CYBER ATTACK IN NETWORK USING DIFFERENT


MACHINE LEARNING APPROACHES
B.ReddyBharath
Dept. Of Computer Science and Engineering
SRMIST
Chennai, India
G.Yaswanth
Dept. Of Computer Science and Engineering
SRMIST
Chennai, India
Dr.C.Santhankrishnan
Dept. Of Computer Science and Engineering
SRMIST
Chennai, India

In contrast to the past, advancements in computer and communication technologies have resulted in
broad and rapid transformations. People, organizations, and governments all benefit from new
inventions, yet some people, organizations, and governments are harmed . For example, security of
important data, the security of stored information , and the accessibility of the data, among other
things. Digital fear is one of the most critical challenges in today's world, based on these difficulties.
Digital apprehension, which has caused a slew of concerns for individuals and organizations, has
reached a point where it might jeopardize open and national security by many groups, including
criminal organizations, Intrusion Detection Systems (IDS) were developed in this vein to keep a
strategic distance from digital attacks. Currently, support vector machine computations were used to
detect port sweep initiatives based on the new CICIDS2017

In the this paper we use the ensembled based hybrid classification which can enhance the better
detection rate since here we use weak and strong classifiers

169. A CONTEMPLATION OF CLOUD SECURITY MENACES AND MITIGATION


TECHNIQUES
Satyam Kastwal1, Sanjay Sharma2

1,2School of computer Science & Engineering,Shri Mata Vaishno Devi University,India

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
86 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

In recent times, the influence of cloud over every single individual as well as over enterprises is quite
evident. As much as it eased the work of various IT firms in providing access to the data, an
exponential rise in the security threat of the data has also been increased simultaneously. The chances
of data loss and other such issues arise with shifting to cloud and there is a simultaneous need to tackle
such issues. This paper is a literature survey of different security mitigation techniques used for clouds
by various researchers. As much the world is dependent on the cloud, there is an equal increase in
potential threat to the data on cloud. Different types of attacks tend to harm the critical data of cloud.
Various researches have proposed different mitigation techniques to the possible threats to the cloud.
Latest of all, one of the research projects proposed the use of blockchain to mitigate security threat to
cloud.

170. BLOOD BANK MOBILE APPLICATION OF IOT-BASED ANDROID STUDIO


FOR COVID-19
Basetty Mallikarjuna, Associate Professor, Galgotias University, Greater Noida, Gautham Budha Nagar, Uttar
Pradesh 203201,
M. Lakshmi Prasad, Associate Professor, Department of Computer Science & Engineering(Data Science),
Institute of Aeronautical Engineering, Dundigal, 500043,Hydearabad,Telangana,India.
Munish Sabharwal, Professor and Dean, Galgotias University, Greater Noida, Gautham Budha Nagar, Uttar
Pradesh 203201

It is impossible to manufacture the blood, as it can be given by the donors. Blood bank retrieval
information can be given through the Android studio application, but there is not much work on the
integrated environment like IoT sensor connected with Android studio application development. This
paper provides the IoT health care sensors connected to the Android studio mobile application
development blood donors and blood receivers. The mobile application is most useful in an emergency
during the COVID-19 pandemic. This observational study gives the web-based application
development and also Android-studio mobile application development for blood bank information
retrieval system. The results are carried out in a real-time environment and updated features of the
blood bank mobile application.

171. VIRTUALLY CONTROLLING COMPUTERS USING HAND GESTURE AND


VOICE COMMANDS
Mayank Sharma1*, Akilesh G2, Vishwaa VS3, Sharon Femi P4, Kala A5

1,2,3UG Scholar, Department Of Information Technology, Sri Venkateswara College Of Engineering


4,5Assistant Professor, Department Of Information Technology, Sri Venkateswara College Of Engineering

In recent years, using a computer in a virtual environment has attracted the interest of researchers.
This paper presents an application that allows gadgets to be more interactive and functional with little
or no physical interaction. To interface with the system, the program provides voice gesture
recognition and hand gesture recognition functions. The interactive system begins with the user being
greeted by a voice assistant named "Proton." The assistant uses the user's input to accomplish activities
like as search, file navigation, date and time, and to start and stop the hand gesture recognition system.
A camera records a live video stream in a Hand Gesture Recognition system, from which the input is
collected via an interface. The system has been programmed to recognize a variety of hand movements
that may be used to do operations such as right-clicking, left- clicking, opening a file, and so on. Our
system detects the coordinates on the hand and recognizes the form and motion when the user holds
their hand in front of the camera. This is accomplished through the use of the blazing palm detector
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
87 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

model and the hand landmark model. In previous systems, data gloves or markers were used to input
data into the system. There are no such limitations in this system. In front of the camera, the user may
intuitively make hand motions. Hand gesture recognition systems that are totally reliable are currently
being researched and developed. The created system acts as the basis for future work that may be
expanded.

172. A UNIFIED APPROACH FOR DETECTING TRAFFIC ACCIDENT AND


ANALYSING THE ACCIDENT PRONE ZONE USING QUANVOLUTIONAL
NEURAL NETWORKS
N Suganthi1, Akarshak Bose2, Shruti Jaiswal3
1,2,3 Department of Computer Science and Engineering
SRM Institute of Science and Technology
Ramapuram Campus

Accidents have been a leading cause of mortality around the globe. In many situations, injuries are
claimed as a result of street consumers' irresponsibility and being stuck in remote locations.
Additionally, the great majority of persons around the accident site are concerned with snapping
pictures and films, completely unaware that their inattention might cost a life. This demonstrates your
society's insensitivity. The goal is to develop a system that can identify an accident using a live video
feed from the CCTV camera mounted on a roadway. The idea is to run each frame of a video through
a quanvolutional neural network model that has been trained to classify video frames as either an
accident or not. Furthermore, it will assist in identifying accident prone locations and alerting vehicles
to the accident prone zones ahead of them. Quanvolutional Neural Networks have shown to be a
quicker and more accurate method of picture classification. When compared to other image classifying
algorithms, QNN-based image classifiers achieve accuracy of more than 94 percent or higher for
datasets and need less preprocessing. When compared to only standard CNNs, QNN models displayed
higher test set accuracy and quicker training times.

173. PREDICTION OF HEART DISEASE USING MACHINE LEARNING


ALGORITHMS
Ronak Piraka
Computer Science Engineering
SRM Institute of Science and Technology
Chennai, India
Karan
Computer Science Engineering
SRM Institute of Science and Technology
Chennai, India
Thenmozhi R
Computer Science Engineering
SRM Institute of Science and Technology
Chennai, India
Early detection of diseases has become a very crucial problem due to rapid growth of population in
medicinal research in the current times. With a sharp increase in the population density, the risk of
death due to heart diseases is rising at an alarming rate. The statistics shows us that at least one person
passes away every minute due to a heart disease. There are many factors that contribute to a person
having heart disease which are age, living conditions, do they smoke and much more. In this paper,

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
88 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

we are going to talk about multiple machine learning algorithms that are used to predict if a person
has a heart disease or not.

174. CODE PINK: A NEWBORN ABDUCTION DETECTION SYSTEM


Sathish G
Undergraduate: Department of Electronics & Communication Engineering
Sri Sairam Engineering College
Chennai, India
Dr.Sumathi S
Associate Professor: Department of Electronics & Communication Engineering
Sri Sairam Engineering College
Chennai, India
Santhosh V
Undergraduate: Department of Electronics & Communication Engineering
Sri Sairam Engineering College
Chennai, India
Ajai Prasanna V N
Undergraduate: Department of Electronics & Communication Engineering
Sri Sairam Engineering College
Chennai, India
Child abduction incidents have long been a source of concern in our culture.In India, the number of
incidences of kidnapping or child swapping is steadily increasing. This study suggests a system for
live newborn tracking that can be recovered quickly if babies are exchanged or kidnapped.This study
suggests the creation of a prototype that can be easily worn and removed, that receives data from
satellites such as latitude and longitude, saves the baby's current location, and alerts the parents. This
wearable prototype includes a GPS module for tracking location and displaying exact latitude and
longitude, as well as a GSM cellular module for sending and receiving messages through mobiles. If
a baby is stolen or switched inside a hospital, the user can easily locate it by sending a message to the
wearable gadget, which will display the position in the browser via Google Maps. We can defend
against any crime that occurs using this technique, even if there is no guardian present.

175. REAL TIME CRIME DETECTION USING GESTURE RECOGNITION

P. Sangeetha
Department of Information Technology
SRM Valliammai Engineering College
Chennai, India.

U. Shajitha Banu
Department of Information Technology
SRM Valliammai Engineering College
Chennai, India.
K. Saranya
Department of Information
Technology SRM Valliammai
Engineering College Chennai, India.
P. Saranya
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
89 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Department of Information Technology


SRM Valliammai Engineering College
Chennai, India.

This paper proposes about an AI-based people security system that aims to protect people who are in
trouble. In a critical situation, this system can respond correctly both automatically and manually. To
accurately monitor the victim's status, the proposed system includes a Gesture, Speech, Violation
detection and location share with help of GPS. The collected data is processed using a python and
MediaPipe, and the protective action is done depending on the severity of the situation. The victim's
location is reported to the appropriate authority as part of the protection system's request for rescue
action. And alert will be generated.

176. PERFORMANCE ENHANCEMENT OF FULLY HOMOMORPHIC ENCRYPTION


AND DECRYPTION USING HIGH SPEED MULTIPLIER
Dr. G. SENTHILKUMAR

Associate Professor, Dept. of ECE, SCSVMV Deemed to be University, Kanchipuram, India.

A high speed fully homomorphic encryption system is intended as a key cryptographic tool for
developing a reliable and secure cloud computing environment, as it allows arbitrary evaluation of a
ciphertext without revealing the plaintext. However, existing encryption implementations stay
unrealistic due to very elevated time and resource costs. This paper presents the design of a power and
area efficient high speed 768 000-bit multiplier, based on Fast Fourier Transform multiplication for a
fully homomorphic encryption operation. By implementing a specific prime as the base for the finite
field, the radix-16 calculations were simplified to requiring only sum and shifting operations. A two
stage carry look ahead system was employed to determine carry and obtain multiplications result. The
multiplier design was implemented and verified by Verilog HDL and simulated by Modelsim 6.4 c
and MATLAB Tool. The Performance was measured by Xilinx tool synthesis Method.

177. SMART ELECTRICITY DEMAND FORECASTING BY USING HYBRID ARIMA


WITH LSTM ALGORITHM
C.BRINDHA
Information Technology National Engineering College Kovilpatti, India
S.SIVA KUMAR
Information Technology
National Engineering College Kovilpatti, India
G.PANDIYA RAJAN
Information Technology National Engineering College Kovilpatti, India
K.RAJAKALI
Information Technology
National Engineering College Kovilpatti, India
For the operation and administration of power systems, demand forecasting, or the projection of future
energy demand, is required. Power supply and demand conflicts can be alleviated with effective
electricity demand forecasting. Furthermore, accurate load forecasting may help power plants operate
more efficiently while also ensuring grid safety. A drop of a few percentage points in forecast

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
90 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

accuracy, it is believed, would have a considerable cost impact on enterprises competing in highly
competitive power markets. We will use a Deep learning algorithm named Improved in our project to
estimate power consumption. We can obtain accurate future predicted output by utilising improved
hybrid ARIMA with LSTM.

178. MODIFIED M-RCNN APPROACH (AOD-NET) FOR ABANDONED OBJECT


DETECTION IN PUBLIC PLACES

Rahul Chiranjeevi V1*, Malathi D2,


1,2SRM Institute of Science and Technology, Kattankulathur, 603203, India
*Corresponding Author: Rahul Chiranjeevi

Detection of abandoned and stationary objects like luggage’s, boxes and machineries etc. in public
places is one of the challenging and critical tasks in video surveillance system. These objects may
contain weapons, bombs or other explosive materials that possess threat to public. Though various
applications have been developed to detect the stationary objects various challenges like occlusions,
change in geometrical features of objects etc. are still to be addressed. By considering the complexity
of scenarios in public places and variety of objects a context aware model is developed based on Mask
Region-Based Convolution Network (M-RCNN) for detecting the abandoned objects. A modified
convolution operation is implemented in the Backbone network to understand features from geometric
variations near objects. This modified operation layers can be adapted based on the geometric
variations in order to extract required features. Finally, a bounding box operation is performed to
locate the abandoned object and masking the particular object. Experiments have been performed on
the bench mark dataset like ABODA, which shows that a mAP of 0.6948% is achieved. An ablation
analysis has also been performed and a compared with other state of art methods. Proposed model
performed well in detecting the abandoned objects compared to existing state of art methods.

179. AUTONOMOUS HOME GARDENING SYSTEM USING IOT


1Dr.P Suresh, 2S Maheshwaran, 3R Pavithra, 4N Monisha
1Associate Professor, 2,3,4 Students, Computer Science and Engineering, KPR Institute of
Engineering and Technology, Coimbatore

Plants have a significant role in reducing air pollution by absorbing the pollutant gases, absorbing
carbon dioxide, and releasing the oxygen that human beings can breathe. During day-to-day activities,
planting is reduced because of improper monitoring, and most people still use the physical method for
passing water to the plants. A proper irrigation system helps the plants grow well and prevents them
from the improper water supply that can cause adverse effects, leading to poor crop development. The
autonomous home gardening system uses IoT water conservation by providing water based on the
needs of the plants without any human resources. Node MCU and various sensors are used to monitor
the plants automatically. The sensors give information about the soil moisture and temperature content
connected to node MCU. It analyzes the parameter and passes the water to the plant without the
physical presence of humans. The information can be sent to mobile devices by using the Android
application.

180. THERMAL IMPACT SENSITIVITY ANALYSIS OF FLASH POWDER MIXTURE


FOR FIREWORKS APPLICATION
L.Prakash, A.Azhagurajan, R.Jegadeesan
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
91 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Department of mechanical engineering, Mepco schlenk engineering college, Sivakasi-626005, Tamilnadu, India
Department of mechanical engineering, Mepco schlenk engineering college, Sivakasi-626005, Tamilnadu, India
Department of mechanical engineering, Mepco schlenk engineering college, Sivakasi-626005, Tamilnadu, India

The fireworks flash powder composition containing aluminium, sulphur and potassium nitrate are very
sensitivity at room temperature. This paper suggests that the aluminium powder is replaced by
biodiesel coated dextrin powder to reduce the sensitivity of the existing flash powder. Open burning
tests were conducted to the newly synthesized flash powder and compared with the existing flash
powder mixture. The thermal impact sensitivity tests are carried out for both the existing and the newly
synthesized flash powder mixtures at temperatures 35°C, 40°C and 45°C. From the thermal impact
sensitivity results, the flash powder mixture having 20% of S, 57% of KNO3, 16.1% of Al, and 6.9%
of biodiesel coated dextrin powder is very sensitive at 40°C and 45°C.

181. EVALUATION OF GROUNDWATER CHEMISTRY AND MULTIVARIATE


STATISTICAL STUDIES IN PARTS OF TIRUPUR DISTRICT, TAMIL NADU,
INDIA
K.Arumugam*
Department of Civil Engineering,
Kongu Engineering College, Erode, India
T.Karthika
Department of Civil Engineering,
Kongu Engineering College, Erode, India
R.K.Sangeetha
Department of Civil Engineering,
Kongu Engineering College, Erode, India
J.Sujithkumar
Department of Mechanical Engineering,
Paavai Engineering College, Namakkal, India
K. Raja
Department of Civil Engineering,
Kongu Engineering College, Erode, India
S.Vikashini
Department of Pharmacy Practice,
Nandha College of Pharmacy, Erode, India

Groundwater quality at any location depends on the mutual possessions of several progressions beside
the subsurface flow path. Perceptive of natural history and degree of infectivity in particular region
involves absolute hydro-chemical statistics. In order to assess the groundwater chemistry and its
appropriateness for consumption purpose, sixty three subsurface water samples were analyzed for
evaluating to the standard values. Based on perceptive of the hydro-geological and groundwater
environment, the chemical characteristics of the groundwater were evaluated. The favored parameters
for the quality assessment are major anions and cations along with pH, turbidity, total dissolved solids,
total hardness, fluoride, and iron as trace metal. Total dissolved solids distribution, hydrochemical
facies, Piper diagram, factor analysis, correlation studies and cluster analysis were carried out to
evaluate the study zone. The physical parameter total dissolved solids (TDS) was clustered
independently. The assessment concludes that the groundwater of the Tirupur region is critically
deteriorated by different anthropogenic activities.
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
92 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

182. PREDICTION ON REAL ESTATE HOUSE PRICE USING REGRESSION


MODELS
Siddhartha Gaba1, *S. Iniyan2
1Department of Computer Science and Engineering, SRM Institute of Science and Technology, Kattankulathur,
Chengalpattu -603203, India
2 Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology,
Kattankulathur, Chengalpattu -603203, India

Machine learning has had a significant impact on image recognition, product recommendation, clinical
diagnosis, and nearly every other field of technology. Every aspect of our life is surrounded by
machine learning algorithms that help to improve security, public safety, medicine, transportation, and
so on. Because of the growth in urbanization and the volatility of property values, there is a greater
demand for a system that predicts property prices. Real estate price prediction can assist in resolving
this issue and forecasting house prices so that customers can examine them. This paper reflects the
effort made to solve the aforementioned challenge. A comparison of the use of existing machine
learning algorithms is conducted, proof of which method is best suited for this task is supplied, and
the prediction engine is developed for real-world use by users.

183. TIME DELAY NEURAL NETWORK ANALYSIS FOR LIP READING - NEURAL
MACHINE TRANSLATION
Sangeetha R1 and Malathi D2
1,2 SRM Institute of Science and Technology Kattankulathur, Chennai

Lip-reading used to educate deaf and hard of hearing individuals to talk and communicate successfully
with other people for hundreds of years. Language content may be obtained through Lip Reading by
studying the speaker's lip shape and movement. The ability to lip-read helps deaf individuals
comprehend what others communicate. The speaker's subtitles are obtained by taking a video of
converting Hindi language to English language, importing it into the suggested model. To get reliable
results, users might employ deep learning technology to extract a vast number of various
characteristics. Our proposed approach uses sequence-to-sequence architectures built for (NMT)
Neural Machine Translation and audio speech recognition. To automatically learn nonlinear decision
surfaces, the Time-Delay Neural Network (TDNN) employs error back-propagation to construct a
three-layer hierarchy, allowing the network to discover sequences. The paper presented a TDNN
approach to lip recognition that possesses both of these essential properties. The suggested model
consists of three stages: Prepossessed, encoding, and decoding. As a result, it 1) introduces a unique
approach for inter-modality processing (before separate moralities acquire characteristics) and 2)
expands the previously suggested cross-connections. Our findings proved that a TDNN is the best
approach for predicting acoustics from sensor data. Our unique process combines the findings of visual
and audio speech to remedy the observed gaps. By lowering the word mistake rate the TDNN achieved
a detection accuracy of 98 percent after evaluating accuracy from speakers.

184. ON-ROAD VEHICLE BREAKDOWN ASSISTANCE


Vishesh Kumar, Mr. N Siva Kumar

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
93 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Department of Master of Computer Application Hindustan Institute of Technology and Science, Chennai
603103, India

People have a strong desire to live a comfortable life free of physical labour. The Internet serves as
the backbone of all technologies, providing a very stable platform for any web- based product. The
Vehicle Service center Website and Mobile Application is a significant advancement in the field of
service centers. The goal of this project is to automate the overall process for the garage owner,
mechanic, and user by identifying the different aspects that affect the service and maintenance of autos
for everyone in order to reduce the time required for it. The project paper on 'Design Website and
Mobile Application for Vehicle Service Center' is available here. Vehicle owners can use an app like
this to communicate with the service center that does the work. Any vehicle user can utilize these two
programs, an android app and a website, at their leisure. The proposed solution is intended to give the
service center owner as much assistance as feasible. This method will aid the owner in keeping track
of the service center's general flow, including the exchange of replacement parts and money. We're
building this with user-friendliness, informativeness, and time savings in mind, but only when the user
registers with the necessary information.

185. A SURVEY ON VARIOUS MACHINE LEARNING TECHNIQUES FOR AN


EFFICIENT BRAIN TUMOR DETECTION FROM MRI IMAGES
Sanjay V1, Dr. Swarnalatha P2,*
1Research Scholar, School of Computer Science and Engineering, Vellore Institute of Technology, Vellore,
Tamil Nadu, India
2,*Associate Professor, School of Computer Science and Engineering, Vellore Institute of Technology,
Vellore, Tamil Nadu, India

On account of the uncontrolled and quick growth of cells, Brain Tumor (BT) occurs. It may bring
about death if not treated at an early phase. Brain Tumor Detection (BTD) has turned out to be a
propitious research field in the current decennia. Precise segmentation along with classification
sustains to be a difficult task in spite of several important efforts and propitious results in this field.
The main complexity of BTD emerges from the change in tumor location, shape, along with size.
Providing detailed literature on BTD via Magnetic Resonance Imaging (MRI) utilizing Machine
Learning (ML) methods to aid the researchers is the goal of this review. Diverse datasets are
mentioned which are utilized most often in the surveyed articles as a prime source of Brain Disease
(BD) data. Furthermore, a concise epitome of diverse segmentation methods that are utilized in
diagnosing BDs has been offered. Lastly, an outline of key outcomes from the surveyed articles is
exhibited, and several main problems related to ML-centered BD diagnostic methodologies are
elucidated. The most precise method to detect diverse BDs can be engaged for future advancement
via this study.

186. CLASSIFICATION OF DIABETIC RETINOPATHY DISEASE


Dr.Mohan Das. R
Department of CSE
Kalasalingam Academy of Research and Education.
Anand Nagar, Krishnankoil, India.
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
94 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Yetrinthala Manoj kumar


Department of CSE
Kalasalingam Academy of Research and Education
Anand Nagar, Krishnankoil, India.
Varra Goutham Reddy
Department of CSE
Kalasalingam Academy of Research and Education
Anand Nagar, Krishnankoil, India.
Indukuru Ramachartan
Department of CSE
Kalasalingam Academy of Research and Education
Anand Nagar, Krishnankoil, India.

The eye is considered as most sensitive organ in human body. The people who are suffering with
Diabetics may get affected with Diabetic Retinopathy. It is required that classification diabetic
retinopathy with the best technologies and methodologies. Artificial intelligence is having its vast
applications in various sectors. Due to its ability to perceive the problems, developing the appropriate
reasons for that, deep learning can act as a great aid in addressing the severity of the disease. This
project provide a brief overview of the application of convolutional neural network, and highlights the
various methods available for the detection of disease of diabetic retinopathy on basis of severity.

187. COLLABORATIVE EDGE DATA CACHING - ONLINE


Nivetha N, Krishnaveni S, Pupitha P, Aswathy.R H
KPR institute of engineering and technology

Edge servers installed at base positions provide highly available figuring and storing data to
neighboring app handlers in an edge computing (EC) setting. From the standpoint of the app vendor,
reserving information on edge servers can shorten the period it takes for app users to retrieve
information. An edge server, on the other hand, usually has inadequate information due to its small
scope. By solving the collaborative caching tricky in the EC environment, the purpose of this study is
to reduce system expenses such as facts caching, information migration, and many more. The
collaborative edge data caching issue (CEDC) is an NP-complete problem with a constrained
optimization statement. OCEDC is an operational algorithm for solving the CEDC problem in all time
slots that has been suggested. OCEDC is based on Lyapunov boost and provides verifiable nearoptimal
results while operating online without the need for future data. OCEDC is put to the test on a real-
world dataset, and the findings show that it outdoes quatern sampling alternatives by a significant
margin.

188. MITIGATION OF FIRE AND EXPLOSION HAZARDS OF FLASH POWDER BY


ADDING MONO AMMONIUM PHOSPHATE AS A SOLID INERTANT
A.Azhagurajan, K.Kandakodeeswaran and C.Hariram
Department of mechanical engineering, Mepco Schlenk Engineering College, Sivakasi, Tamilnadu, India.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
95 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Flash powder is a chemical mixture used in the fireworks industry that is highly sensitive in nature.
According to the Petroleum and Explosives Safety Organization's (PESO) guidelines, fireworks waste
should not be stored or accumulated, thus a large pit is dug and all of the debris is burned on the same
day. A solid inertant mono-ammonium phosphate chemical is utilised as a fire extinguishing agent
and to lower the flash powder's sensitivity. The tests were conducted using a mixture of flash powder
and mono-ammonium phosphate in various proportions. It is found that as the amount of inertant
increase in the sample impact due to height increases and friction sensitivity decreases make the
sample in-sensitive and for the layer ignition temperature in the composition of 75% of
monoammonium phosphate and 25% flash powder the sample forms into a lump and colour change
is observed this indicates the sample becomes in-sensitive.

189. A COMPREHENSIVE REVIEW ON TRACTION MOTORS COMPARISON,


OVERVIEW OF OPTIMISATION TECHNIQUES, RECENT AND FUTURE TRENDS
IN ELECTRIC VEHICLE
Krishnakumar C1 Sarojini L2
1Professor of Electrical and Electronics Engineering, Saranathan College of Engineering,
Anna University, Trichy-620012, India.
2Research Scholar of Electrical and Electronics Engineering Department, Saranathan College of Engineering,
Anna university, Trichy-620012,India.

The increasing inclination towards electric vehicles over the last periods is due to various factors. The
motors used in electric vehicles are substantially different from those used in other applications. The
motor in EV applications necessitate excellent efficiency, torque density, reliability, high power
density and high speed, This paper reviews different electrical motor for EV propulsion applications.
A comparative analysis of the DC motor, induction motor, switching reluctance motor, and permanent
magnet synchronous motor is performed to evaluate the best suitable electric motor drives for electric
vehicle applications based on efficiency, power density, cost, maximum speed, torque ripple, range
and fault tolerance. A detailed review is presented on recent existing motors which include axial flux
motors, Flux switching permanent magnet motor, surface mount and interior permanent magnet
synchronous motor. In addition, overviews of control, optimization algorithms and evaluation of
performance for EV electric motor drives are provided. Permanent magnet synchronous motor has
been preferred choice in electric vehicles, according to the review.

190. AI – BASED SMART IRRIGATION SYSTEM


Sardhi Hawa.J1*, Priyanka.S2*, Subhashree.S3*, Dr. Jackins.V4*
1 Under Graduate, Information Technology, National Engineering College, Kovilpatti.
2 Under Graduate, Information Technology, National Engineering College, Kovilpatti.
. 3 Under Graduate, Information Technology, National Engineering College, Kovilpatti.
4 Assistant Professor(SG), Information Technology, National Engineering College, Kovilpatti .

Globally, irrigation is scheduled according to crop visual inspection by farmers and as a result, about
50% of water is wasted by traditional irrigation systems. Sprinkle irrigation, drip irrigation, and furrow
irrigation are examples of controlled irrigation methods that decrease water wastage by 30 – 70%.
These systems, however, fail to hold precise water in the soil owing to their open structure, which
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
96 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

affects the quality and number of plants by irrigating less or dramatically reducing soil nutritive.
Therefore, there’s a desire for feedback on integrated precision irrigation practices to efficiently utilize
water without harming the development of crops. Precision irrigation takes soil moisture, climate
information, and crop type to estimate water is required or not. If therefore reduces the cost of farm
workers. The proposed system uses a hybrid random forest with a linear model (HRFLM) for
prediction work. For the hybrid random forest and linear models, we employed an ensemble voting
classifier. Due to the architecture of the hybrid algorithm, we achieved accuracy for prediction. To get
more than 96% of accuracy.

191. CUSTOMER SEGMENTATION USING NATURAL LANGUAGE


PROCESSING
Sabari Balamurugan, Sahid Akil , Sathyan
Dept of computer science and Engineering
Sri Krishna college of technology, Coimbatore,India

SA is commonly known as Sentimental analysis is a continuous field of research on analysis consumer


emotions on purchase of products. This survey paper tackles an inclusive survey of mobile
phone reviews. One of the most significant uses of unsupervised learning is customer segmentation.
Companies can discover different categories of clients using clustering algorithms, allowing them to
target the prospective user base. In this machine learning project, we will utilize nltk for clustering,
which is the most important approach for grouping unlabeled datasets. The acquired findings
illustrate the efficacy of the solution, which has a high level of accuracy in both mobile
classification and user segmentation.

192. ENERGY EFFICIENT CH SELECTION & OPTIMAL RELAY NODE SELECTION


ALGORITHM AND ITS PERFORMACE ANALYSIS FOR WIRELESS SENSOR
NETWORKS
S ANURADHA, Dr. D.Sreenivasa rao
Research Scholar, ECE, Professor ,ECE
JNTUH Hyderabad, India

Based on the application type, a wireless sensor network would be a heterogeneous type. The energy
consumption is one of the major issues for WSNs. The overall energy conservation of WSNs would
be reduced by the existing communication protocols. The network is partitioned into the clusters using
the low-energy adaptive clustering hierarchy (LEACH), which is a cluster-based protocol that chooses
a few sensor nodes randomly as cluster heads (CHs) according to the generation of random numbers
in each sensor node. The CHs role rotates for even distribution of energy load among sensor nodes of
a network. The improved version of LEACH protocol has been proposed to achieve the energyefficient
and stable CH selection. The random number is generated using a proposed work based on the
inclusion of different parameters like average residual energy (ARE) and CH coverage (CHC). The
chosen CHs would have more neighbours in the coverage circle by using the CH coverage parameter
(CHC) that reduces the energy consumption by member nodes towards reaching the CH. The higher
energy should have included in the selected CHs that ensures by the average residual energy (ARE).
The multi-objective selection parameters have been improved the Particle Swarm Optimizer (PSO)’s
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
97 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

fitness function to enhance the selection of a relay node and energy efficiency during the phase of data
transmission. To carry out the relay selection, the proposed enhanced-PSO algorithm is considered
the parameters like Average Energy Load (AEL), Link Error Rate (LER), and Traffic Index (TI).
Based on the analysis of simulation results, the proposed technique achieves increased performance
in terms of communication quality via dynamic and static scenarios, network lifetime, and energy
consumption.

193. ENERGY EFFICIENT STREET LIGHTING SYSTEM


Dharshini V, Saranya S, Sethuraman V K, Jawahar A, Vinoth Kumar .C
Department of Electronics and Communication Engineering Sri Sivasubramaniya Nadar College of
Engineering,
Rajiv Gandhi Salai (OMR), Kalavakkam, Tamil Nadu, India

To reduce consumption of energy, energy efficient smart street lighting system is implemented which
saves a lot of energy compared with conventional street lighting system. The main function of energy
efficient street lighting system is light will glow, if there is no light and no motion of vehicles and
human. Most of the countries using fluorescent lamps which consumes a lot of energy. In this work,
energy efficient smart street lighting system is proposed to save the energy by using light Emitting
Diode(LED), LDR sensor, Ultrasonic sensor driven by raspberry pi. By comparing the proposed street
light and conventional street light, there is huge difference in energy consumption. In this proposed
model, LDR sensor senses the intensity of light. ultrasonic sensor is used to detect the movements of
the object. Based on the LDR and Ultrasonic sensor output values, we can determine either led should
glow or not. From this proposed system, the energy usage drastically reduced.

194. DEEP LEARNING BASED NEUROIMAGING ANALYSIS FOR PARKINSON’S


DISEASE DETECTION
Mitali Kargwal
Student
B.Tech, Computer Science Engineering
SRM Institute of Science and Technology

Dr. M. Suchithra
Associate Professor (0.G) Department of Computing Technologies
Mrs. Mahalakshmi.P
Assistant Professor (0.G) Department of Networking and Communications
SRM Institute of Science and Technology

Parkinson’s disease (PD) is the second most preva- lent neurodegenerative disorder affecting more
than 10 million people globally. Being an incurable disease, its onset prediction and analysis is crucial.
Deep learning techniques have been pro- gressing significantly towards neuroimaging and other
medical analyses. In this study, we leverage the use of various Convolution Neural Network models
such as 2D-CNN, VGG16, ResNet50 and LeNet-5 to classify the intricate functional Magnetic
Resonance Imaging(fMRI) scans for distinguishing the Parkinson’s Disease affected brains from
healthy ones. By achieving the highest accu- racy of 99.70%, this endeavour concluded that CNN
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
98 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

architectures have the prospect to draw out extensive discerning features and novel biomarkers from
complex clinical data and therefore has the competence to be beneficially utilized to a greater extent
in more advanced systems.

195. RECOMMENDATION SYSTEM FOR COLLEGE ELECTIVES USING ALS


IMPLICIT COLLABORATIVE FILTERING AND LSTM NETWORK
Shreyas Raorane1, Smitha Sampathkumar1, Supraja P2
1UG Student, Department of Networking and communications, SRM Institute of Science and Technology,
Kattankulathur
2Associate Professor, Department of Networking and communications, SRM Institute of Science and
Technology, Kattankulathur

Elective recommendation systems have become an essential technology in the field of higher
education in today’s world. The spectrum of subjects and technologies included in today’s education
system has increased drastically [1] [2]. Over the span of a century, courses and subjects have
penetrated their way in and out of an educational institute’s curriculum. The aim of this system is to
help students make an informed decision about their electives through the use of machine learning
algorithms and historical data. [4]In this model, we use ALS Implicit Collaborative Filtering and
LSTM network to put in place an effective structure that will provide recommendations based on the
student's interest, rating, and historical data. The system allows the students to prioritize one category
of rating over the other based on their interests. This enhances the system’s performance by ensuring
that the subjects that have a higher average rating are being given preference.

196. IOT BASED SMART SECURITY AND SURVEILLANCE SYSTEM


Aishwarya Jagadiswaran
Department of Information Technology
SIES Graduate School of Technology
University of Mumbai
Navi Mumbai, India
Ritika Karthikeyan
Department of Information Technology
SIES Graduate School of Technology
University of Mumbai
Navi Mumbai, India
Seema S.Redekar
Department of Information Technology
SIES Graduate School of Technology
University of Mumbai
Navi Mumbai, India
Jagthish Thevar
Department of Information Technology
SIES Graduate School of Technology
University of Mumbai
Navi Mumbai, India

IoT is an escalating trend in today’s world and has proved to be a game-changer in the field of
technology. There is a high need for security systems in our everyday life. For example, security in a
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
99 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

business space, an organization is important now. Currently, security cameras are being used in order
to develop secure places in the company. Sensors and devices are used to develop new systems to
overcome existing security issues. Lately, there are many security systems, which make use of various
motion sensors to detect any motion and notify the owner. However, most of these systems do not
provide the features of remote camera surveillance, power efficiency, advanced security combined
with ease of use. The main aim of this paper is to enhance the traditional security system and overcome
all these problems by developing a smart security and surveillance system that makes use of multiple
sensors, provides a warning to the person who has intentionally or unintentionally entered the
company. The main advantage of the system is the ability to remotely manage the organization 24/7.
We aim to design lightweight, low-cost, extensible, flexible, smart security systems using IoT which
employs the integration of various latest technologies that can be used to control a system in an
organization. All these features combined create a reliable security system.

197. MITIGATING SHATTER BEHAVIOR OF FIREWORKS BUILDING


STRUCTURE USING REINFORCED HOLLOW BLOCK
A.Azhagurajan1, L.Prakash2, T.Ganesh Kumar3
1Department of mechanical engineering, Mepco schlenk engineering college, Sivakasi -626005, Tamilnadu,
India
2Department of mechanical engineering, Mepco schlenk engineering college, Sivakasi -626005, Tamilnadu,
India
3Department of mechanical engineering, Mepco schlenk engineering college, Sivakasi -626005, Tamilnadu,
India

In this paper, the load carrying capacity of reinforced hollow block (Steel fibre) was analyzed by
conducting varies experiment like compression and impact test. The experiment was carried out by
varying the reinforced percentage (1%,2%&1% chopped) and different types of hollow block used
like hollow block, hollow mould block. The reinforced hollow block was manufactured under the
guidance of authorized hollow block manufactured. The steel fibres are randomly distributed along
with raw materials during the mixing process. After the curing process, the hollow block was tested
by using universal compression test equipment and concrete impact test setup. The results show that
the compression strength increased by 33.45 % and impact resistance improved up to 13.22% for the
2% steel fibre reinforced hollow mould block. The finite element analysis using Ansys explicit
dynamics also reflects the more or less equivalence result.

198. GESTURE RECOGNITION SYSTEM USING CONVOLUTED NEURAL


NETWORKS AND TRANSFER LEARNING
Varun R Swaminathan
Computing Technologies
SRM Institute of Science and Technology
Kattankulathur, India

Shubhaam Agrrawal
Computing Technologies
SRM Institute of Science and Technology
Kattankulathur, India
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
100 Proceeding of International Conference on Contemporary Engineering and
Technology
May 21st – 22nd, 2022

Dr. C Santhanakrishnan
Computing Technologies
SRM Institute of Science and Technology
Kattankulathur, India

Webserver is a web application designed to convert images to text, which may then be said out using
the anticipated text generated by the image converter. For this application, images are captured
through webcam as hand gesture inputs. In addition, Google Home and Amazon's Alexa may be used
in conjunction with this software. The collected movements may be used for specific smart device
functions, and the software can also call out the gesture inputs in various operating system voices
(OS). Browsers as well as smart devices are able to handle these multiple OS voices. TensorFlow was
used to create this HTML and JavaScript application. In order to run this JavaScript model, we need
the Node.js runtime environment. Using a Machine Learning (ML) method, there is no need to install
drivers or libraries in this application. Once a user has found the webpage, the software is ready for
use.

199. PRODUCT RECOMMENDATION ENGINE USING KNN AND K-MEANS


Arun Prashath D
UG Scholar, Department of CSE,
KPRIET, Coimbatore, India.
Dhivakar PS
UG Scholar, Department of CSE, KPRIET,
Coimbatore, India.
Dr. Devi Priya A
Assistant Professor, Department of CSE, KPRIET,
Coimbatore, India.
Gokul G
UG Scholar, Department of CSE, KPRIET,
Coimbatore, India.

The sale and purchase of items is beginning to shift from being done in person to being done online.
The goal of this research is to create a product recommendation system on an e-commerce platform
that is tailored to the demands of the users. This research focuses on providing recommendations based
on the 'rating' or 'preference' that a user would give to an item and provides recommendations to
existing users and new users. These users can get personalized recommendations from the
recommendation system, which can help them make better decisions in their online purchases, boost
sales, redefine their user experience, retain consumers, and improve their shopping experience. Thus
the Seller can determine which product to launch in the market based on consumer preferences to gain
more benefits.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
101 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

200. VISION AND INFRARED SENSOR BASED DISTANCE ESTIMATION FOR


MICRO AERIAL VEHICLE NAVIGATION
K. Mohith Raj1 , Dr.B.Anbarasu2, M. Bhuvanesh3, J. Dinesh4
Hindustan Institute of Technology And Science, Padur, Chennai
1. UG student, Department of Aeronautical Engineering, Hindustan Institute of Technology and
Science, Chennai, Tamil Nadu, India.
2. Assistant Professor, Department of Aeronautical Engineering, Hindustan Institute of Technology and
Science, Chennai, Tamil Nadu, India.
3. UG student, Department of Aeronautical Engineering, Hindustan Institute of Technology and
Science, Chennai, Tamil Nadu, India.
4. UG student, Department of Aeronautical Engineering, Hindustan Institute of Technology and
Science, Chennai, Tamil Nadu, India.

To know the distance of things without using the old school methods of scales are something that’s
fascinating. Technology development has led to bringing numerous methods to find the distance of an
object using computer technology. The method most used is the one involving camera. This method
has proved to work well but one of the major drawbacks is in identifying the image. On the other hand,
distance sensors help us accomplish this task more efficiently. Therefore, this research work is based
on how a camera and a distance sensor is used to measure the distance of an object or an obstacle.

201. INDOOR MICRO AERIAL VEHICLE NAVIGATION USING OPTICAL FLOW


Dr.B. Anbarasu1, M. Bhuvanesh2, J. Dinesh3, K. Mohith Raj 4
Hindustan Institute of Technology And Science, Padur, Chennai
1.Assistant Professor, Department of Aeronautical Engineering, Hindustan Institute of Technology and
Science, Chennai, Tamil Nadu, India.
2.UG student, Department of Aeronautical Engineering, Hindustan Institute of Technology and Science,
Chennai, Tamil Nadu, India.
3.UG student, Department of Aeronautical Engineering, Hindustan Institute of Technology and Science,
Chennai, Tamil Nadu, India.
4.UG student, Department of Aeronautical Engineering, Hindustan Institute of Technology and Science,
Chennai, Tamil Nadu, India.

Micro Aerial Vehicle (MAV) is widely employed in the global industry, and it is used in various
of sectors for a variety of applications. The MAV is used by a variety of companies to transport
packages. They're also deployed in a variety of military and civilian applications. For long range and
non-viewable locations, the MAV utilizing image processing. The MAV are unmanned vehicle they
depend upon the information sent by the sensor for the navigation. Sometimes failure may occur and
the MAV may face some damages. Until date, the work in this field has focused on object detection
or distance estimate; however, in this study, the algorithm that developed can compute both. This
combined process will be more useful in the indoor environment for the navigating the MAV (can be
used for avoiding the collision or an obstacle easily while navigating in the indoor environment). This
combined method may reduce the chances of failure. Detailed explanation and experimental results
are explained below.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
102 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

202. BRAIN TUMOR DETECTION USING DEEP LEARNING


M.Raja,Department of Computer Science and Engineering,Kalasalingam Academy of Research and
Education,Anand Nagar, Krishnankoil
Venkata sai Ramanjaneya Reddy Pagadala,Department of Computer Science and Engineering,Kalasalingam
Academy of Research and Education,Anand Nagar, Krishnankoil
Leela nath Reddy Pereddy,Department of Computer Science and Engineering,Kalasalingam Academy of
Research and Education,Anand Nagar, Krishnankoil
Surya Prakash Narahari,Department of Computer Science and Engineering,Kalasalingam Academy of
Research and Education,Anand Nagar, Krishnankoil

Brain tumour analysis without human intervention is a critical field of research. Convolutional neural
networks, on the other hand, can be used to do this (CNNs). They have excelled at solving computer
vision problems as well as a variety of others, including visual object recognition, detection, and
segmentation. It detects brain tumours by improving brain images utilising segmentation algorithms
that are extremely resistant to noise and cluster size sensitivity issues, as well as automatic area of
Interest (ROI) recognition. One of the key arguments for using CNNs is that they have a high level of
accuracy and do not require manual feature extraction. Detecting a brain tumour and correctly
identifying its type is a difficult undertaking. The performance of CCN is great.than others thanks to
its wide usage in recognising images. neoplasm Manual classification with It's possible to make
blunders in prediction and diagnosis with human assistance. Furthermore, it is a frustrating chore when
there is an excessive amount of knowledge to be aided. Because of the wide diversity of appearances
of brain tumours and the resemblance of tumour and normal tissues, extracting tumour regions from
pictures becomes difficult.

203. REVIEW ON “SEISMIC RESPONSE CONTROL OF IRREGULAR RCC


BUILDING USING BRACING SYSTEM.”
Yogesh Dhamge1, a), Prof. Sanket Sanghai2, b),
1, a), 2, b)Department of Civil Engineering, G H Raisoni College of Engineering, Nagpur, Maharashtra, India

A large number of buildings are now being built and planned based on the needs of the buildings and
aesthetic considerations. Most buildings are built with a local structure such as X shape or V shape
with inconsistent x and y links. Earthquakes cause extensive damage to various buildings, the main
problem being thin. The main purpose of this study is to make a comparative analysis of the dynamic
behavior of buildings with different structural properties in all earthquake zones and soil types.

RC structures with an unusual G + 10 floor are also analyzed without the cross-bracing integration
system, which is one of the best ways to concentrate, in the presented problem. The structural response
to various earth movements is determined using analytical time history. For analysis, the ETABS 2016
program has been hired. It will investigate the effects of the models (most narrative shifts, multi-storey
shear, and multi-storey rigidity).

204. PERFORMANCE ANALYSIS OF SPATIO-TEMPORAL HUMAN DETECTED


KEYFRAME EXTRACTION
Victoria Priscilla C1 and Rajeshwari D2
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
103 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

1Associate Professor & Head , PG Department of Computer Science, Shrimathi Devkunvar Nanalal Bhatt
Vaishnav College for Women, University of Madras, Chennai (TamilNadu), India.
2Research Scholar, Research Department of Computer Science, Shrimathi Devkunvar Nanalal Bhatt Vaishnav
College for Women, University of Madras, Chennai (TamilNadu), India.

Closed circuit television (CCTV) surveillance for detecting the humans involves an expanded research
analysis especially for crime scene detection due to various restraints such as crowded annotation,
night footages, and rainy (noisy) clips. The main visualization of the crime scene is to recognize the
person in particular obtained in all frames is a challenging task. For this occurrence, Content-Based
Video Retrieval (CBVR) method refines the collection of these video frames resulting keyframes to
reduce the burden of huge storage. Here, Spatio-Temporal classifiers method as an added advantage
with frame differencing and edge detection method reports the human detected keyframes without the
termination of background regions in order to negotiate the crime scene more efficiently. The main
objective of this paper is to analyze the obtained keyframes with Human detection pointing a
distinctive between Spatio-Temporal HOG-SVM and HAAR-like classifier to survey the optimum.
Finally, the resulting keyframes mutated with the canny edge detection method by HOG-SVM sequel
with greater accuracy level of 98.21% compared to HAAR-like classifier.

205. AN INTERACTIVE PHYSIOTHERAPIC EQUIPMENTS FOR CEREBRAL


PALSIC CHILDREN
M.Kathiravan1,Department of Biomedical Engineering Jerusalem college of Engineering Chennai,
Tamilnadu,Dharshini Venkatesan2, Department of Biomedical Engineering SSN college of
Engineering,Chennai, Tamilnadu

R.Arulselvi2,Department of Biomedical Engineering SSN college of Engineering Chennai, Tamilnadu,


Jeevitha R2,Deparment of Biomedical Engineering SSN college of EngineeringChennai, Tamilnadu, R.Merlin
Jeba Limsa2, Department of Biomedical Engineering Jerusalem college of Engineering Chennai, Tamilnadu

World Health Organisation states that 20% of children is affected by cerebral palsy which is a
neurological disorder that affects the muscular movement in prenatal, perinatal and postnatal time
period. Rehabilitation for cerebral palsy children involves physiotherapy in which the sessions are
extremely long, tedious and the children are reluctant to continue the entire process . This drawback
can be overcome by Interactive physiotherapic equipment. This helps the children to deviate from
their pain during the therapy. In this project, shoulder wheel is modified as an interactive equipment
by mounting Infra Red sensors and Light Emitting Diode. Infra Red sensors pick signal from eight
sectors in board which triggers the Light Emitting Diode to glow that act as visual feedback for
cerebral palsy children.In addition to that Liquid Crystal Display gives the score for the session done
by Cerebral Palsy children which will help for evaluation purpose and each rotation is accompanied
by a chocolate from automatic chocolate dispenser. The parallel bar is modified as an interactive
equipment by fixing pressure sensors and the audio, robotic action is given as Feedback. The entire
operation is controlled by Arduino microcontroller in both the equipments and it is found that it
produces better response and reduce reluctance during physiotherapy session.

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
104 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

206. FLY ASH AS MINERAL ADMIXTURE IN CONCRETE MATRIX – A STATE OF


THE ART
Dr.Brindha Sathiaseelan1,a), Mrs.M.HannahAngelin and Dr.P.Sathiaseelan2, 3, b)
1, 2Assistant Professor, Department of Civil Engineering, Coimbatore Institute of Technology, Coimbatore,
India. 3Professor and Head, Department of Civil Engineering, PPGIT, Coimbatore, India.

Among recent research, the use of fly ash in partial replacement of cement has steadily increased as
an inexpensive and practical method to dispose of the thermal station by-product, namely fly ash. This
extra ingredient influences the qualities of concrete based on a variety of elements such as cement
grade, % of replacement, environmental conditions, and curing times. As fly ash might affect the
compressive strength and rheological properties of concrete, a review of prior reports on fly ash
concrete mixes subjected to various experimental settings are done. When the substitution proportion
is appropriate, it is proven that a low calcium fly ash concentration increases the compressive strength
of the concrete of concrete matrix over a range of 28 to 56 days and optimizes the concrete rheological
properties. When fly ash is used as a viable substitute for cement, it has a low-cost and long-term
function on the concrete.

207. A REVIEW: BLOCKCHAIN & CRYPTOGRAPHY USED TO SECURE DATA

Kavitha C V∗ , Lokamathe P∗ , M Yamuna∗ , Meghana M S∗ , Mrs. Tanuja Kayarga (Assistant


professor) †, ∗ †Department of Computer Science and Engineering, Vidyavardhaka College of
Engineering (VVCE) Mysuru,

Block chain technology is gaining more popularity over the past few years. Blockchain is a distributed
site that is shared between computer network nodes. In today's world of advanced technology, many
people are victims of cybercrime. Data protection becomes one of the most important things. One of
the key technologies of Blockchain is cryptography. Cryptography is a technique which transform
legible data to an ambiguous conformation with the help of keys and does the same in conversely. The
performance of the algorithm steady primarily based on the complication and rotation of the CPU
needed for the Crypto analysis in it. By combining Cryptography techniques and Blockchain
technologies we will see how data can be effectively protected.

208. BIOMETRIC SYSTEM FOR FACE RECOGNITION USING TENSOR FLOW ON


RASPBERRYPI FOR EDUCATIONAL INSTITUTIONS
K. Krishna Vamsee Vardhaman College of Engineering Hyderabad, India
Kalyan Jalaneela Vardhaman College of Engineering,Hyderabad, India
Mr. T. Ramakrishnaiah Vardhaman College of Engineering Hyderabad, India

The proposal's main purpose is to develop a facial recognition-based attendance management device
for academic institutions in enhancing and replace the traditional attendance system and boost
productivity. The existing outdated method has several flaws. There was a lot of ambiguity, which
resulted in erroneous and inefficient attendance taking. There are numerous issues. When the authority
is unable to enforce the previous system's regulations, problems develop. Thus, this project will use
technology to fix the weaknesses in the current system while remaining cost-effective. By automating
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
105 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

the majority of the tasks, you can take attendance to a whole new level. The face recognition system
will be the technology at work.

The face recognition system will be the technology at work. One of the fundamental features that
could be used to define someone is their face. As a result, it is utilized to trace individual because the
chances of a face deviating or being replicated are limited. Face databases will be built in this project
to feed data into the recognizer algorithm. The likelihood of data being repeated is low. Throughout
the attendance-taking process, the features would be linked to the system to verify identity. Whenever
an user is spotted, their attendance is recorded right away, as well as the necessary data is maintained
in a relational database. The attendance data is collected after the day. A web server operated by the
Raspberry Pi can be used to obtain information about an individual.

In brief, this improved generation of the attendance tracking model not only saved a lot of money but
also gave the authority a lot of ease because many processes were automated.

209. CLIENT-SERVER ARCHITECTURE, IOT DEVICES, FACIAL BIOMETRIC


SYSTEM, LOCAL DESCRIPTORS, TENSOR FLOW, CONVOLUTIONAL NEURAL
NETWORKS (CNN), DEEP LEARNING
Dr. S. Arunvinthan Pillai,Department of Aeronautical Engineering,Kalasalingam Academy of Research and
Education ,Krishnankoil, Virudhunagar, India
V Manoj,Department of Aeronautical Engineering,Kalasalingam Academy of Research and Education
Krishnankoil, Virudhunagar, India
C Hari Babu, Department of Aeronautical Engineering, Kalasalingam Academy of Research and Education,
Krishnankoil, Virudhunagar, India

The project aims to use passive flow control technology on a leading edge protuberant wing and its
impact on aerodynamic performance at different Reynolds number varying surface roughness. Due to
its wide applications in areas such as aircraft wings, wind turbine blades and propellers. The
aerodynamic performance characteristics of the leading-edge protuberanced wing at different
Reynolds Number with surface roughness have been tested. Adding protuberances to the leading edge
of the wing is considered a viable passive control method for separating the flow and increasing
aerodynamic efficiency by positively affecting lift characteristics without introducing additional drag.
The aerodynamic performance of the modified airfoil with leading-edge protuberances was examined
and compared with the baseline NACA 63(4)-021 airfoil. Airfoils were pitched from an initial angle
of attack of 0∘ to 45∘ at constant pitch rates with Reynolds number from to and surface roughness
of 10 different grit sizes. Flow parameters such as velocity is chosen to find the optimised
configuration keeping the amplitude constant as 0.12c and varying wavelength of the leading-edge
protuberances as 0.25c,0.5c,0.75c.

210. HYBRID RECOMMENDATION SYSTEM WITH GRAPH BASED AND


COLLABORATIVE FILTERING RECOMMENDATION SYSTEMS
Shubham Khanduri, SRM Institute of Science and Technology, KTR, Chennai, S. Prabakeran, SRM Institute of
Science and Technology, KTR, Chennai

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
106 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

Every online platform on the internet needs to have some kind of recommendation system. A
recommendation system will suggest products or services on a platform to a user, based on their
preference and history. This increases user engagement on the platform, as they help the user in their
choices. Hence, there is a need for a simple recommendation system solution.

Recommendation system works by creating relations between products or the users; and by evaluation
of those relations, it can suggest relevant products related to any product. Hybrid Recommendation
combines the predictions of two or more recommendation techniques. This system combines the
predictions from product - based predictions; implemented using a Graph based recommendation
system, and users - based predictions; implemented using Collaborative Filtering recommendation
system.

211. DRAIN CURRENT ANALYSIS OF Mg0.25Zn0.75O/ Mg0.6Zn0.4O/ZnO


DOUBLE-CAVITY MOSHEMT BASED BIOSENSOR
Kiran G, and Rohit Singh, Department of Electrical Engineering, Shiv Nadar University, G. B.
Nagar -201314, India,

In this work, Mg0.25Zn0.75O/Mg0.6Zn0.4O/ZnO MOS-HEMT (Metal Oxide Semiconductor -High


Electron Mobility Transistor) with a double-cavity below the gate region in both source and drain
sides is proposed for its drain current (IDS) analysis as a bio-sensing device. The analysis is done by
dielectric modulation of the cavity regions to emulate the presence of different dielectric biomolecules
by interfacing capacitance variation. The effective capacitance is obtained by using dielectric
modulation which varies the overall 2DEG density in the device channel so drain-current will get
changed. Interestingly, the changes in the drain current of the device are used as the sensing metric
for the detection of bio-molecules in the cavity region. The predicted sensing metric values of the
developed analytical model are in good agreement with the result of other similar works, thus
confirming the validity of the proposed model.

212. DECENTRALIZED PAYMENT ARCHITECTURE FOR E-COMMERCE AND


UTILITY TRANSACTIONS WITH GOVERNMENT VERIFIED IDENTITIES
Shiny Duela, Department of Computer Science Engineering, SRM Institute of Science and
Technology,Chennai, India
Dr K Raja,Department of Computer Science Engineering,SRM Institute of Science and Technology,Chennai,
India
Prashanth Umapathy,Department of Computer Science Engineering,SRM Institute of Science and
Technology,Chennai, India
Rahul Rangnani,Department of Computer Science Engineering,SRM Institute of Science and
Technology,Chennai, India
Ashish Patel,Department of Computer Science Engineering,SRM Institute of Science and
Technology,Chennai, India

In recent years, blockchain technologies have begun to be adopted by a number of industries as a


means of improving security and efficiency. One area where blockchain technology is beginning to
be used is in the area of payment gateways. Payment gateways are used to process electronic payments
between buyers and sellers. By using blockchain, payment gateways can be made more secure and
efficient. However, there are concerns that blockchain technologies may be used to launder money or

ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College


Prince Dr. K. Vasudevan college of Engineering and Technology
107 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022

finance terrorism. To address these concerns, some countries have proposed making blockchain
technologies only accessible to government-identified individuals. This research paper examines the
feasibility of such a proposal and demonstrates how our proposed architecture model can perform in
real-time. It will discuss the benefits of using blockchain technology in this context and how it can
help to improve security and efficiency. The paper focuses on two essential aspects of the design: how
to verify the identities of individuals in transactions and how to maximize efficiency of this
architecture while promising high security. In addition, the paper will also explore the potential
challenges associated with using blockchain technology in payment gateways.

213. A REVIEW ON SECURE TECHNIQUES FOR KEYWORD-BASED SEARCH


AND DATA SHARING
Dr. Kavitha Esther Rajakumari,Vignesh A,Arjith KS
Hindustan Institute of Technology and Science, Chennai

Server dependability and client security doubt expect data to be revealed prior to sending it to Aiming,
and we want to distinguish watchwords in the data that are stowed away from interlopers and
malignant cloud suppliers that we consider to be a method for impeding the organization. SSE
distributed storage is u