ICCET 2022 - Proceedings Release v1
ICCET 2022 - Proceedings Release v1
(ICCET – 2022)
ORGANIZED BY
Chennai, India.
Website: www.ijsiet.org
In association with
Website: www.psvpec.in
www.princedrkvasudevan.com
ICCET 2022
Organized by:
Venue:
Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and
Technology Medavakkam - Mambakkam Road, Ponmar,
Chennai – 600 127
ISBN 978-93-81288-22-1
Published by:
We are very pleased with the quality, depth, and breadth of this year's
technical program. I wish you a most enjoyable experience at the Conference.
Dr.K.Vasudevan
Chairman
Prince Group of Educational Institutions
VICE CHAIRMAN’S MESSAGE
The words “Engineering” and “Technology” are not just words but are vital
disciplines that guide the world by bringing huge changes to the current way of
living. Modern Engineering and Technological innovations are making people
think that nothing is impossible in this world. Everything can be achieved with an
extremely powerful vision and a path to attain that vision. If a person is doing a
marvel, keep in mind that you too can outshine them with perseverance. Dr. A. P.
J Abdul Kalam said “Dream is not something that comes when you sleep, it is
something that doesn’t let you sleep”, so, dream a lot about how to bring changes
and try to make the changes come true. Remember earning money is not life; it is
just a part of life which can be easily earned when you do it with dedication.
Science and technology have become so closely intertwined, and I hope the
conference will help you to reinforce each other.
th
We are very much elated in welcoming you all to our college for the 10
International Conference on Contemporary Engineering and Technology and I wish
the students all the very best for their presentations.
Vice Chairman,
The world is growing fast in fact it grows in such a way that a thing invented
yesterday becomes obsolete today, which means there is a plethora of competition
in each and every discipline of engineering and technology. This scenario goes well
with a famous quote of a philosopher Heraclitus, who said, “Change is the only
constant in this world.” Now a days people need new inventions for their daily works
so that they can do it with ease. People not only need to do their activities with ease
but they also need it to be done within a period of time. As an engineer we need to
solve problems that are left unsolved. As a way of showcasing
th
the talents of young minds to find solutions we have organised this 10
International Conference on Contemporary Engineering and Technology.
I welcome you all to this event, my warm wishes to the students who are going to
present their papers and also hearty thanks for the staff who have made this event a
great success.
Er. K. Parthasarathy
Administrative Officer
I express my happiness to meet you through this 10th International Conference on Contemporary
Engineering and Technology (ICCET 2022). I am much delighted to convey my warm greetings to
the Guests and the Host. We, at Prince Shri Venkateshwara Padmavathy Engineering College and
Prince Dr. K. Vasudevan College of Engineering and Technology, Ponmar, Chennai impart futuristic
technical education and instil high pattern of discipline. Education is sweeter and valuable when it
promotes the blossoming of natural talent that enriches students to be self reliant individuals. The
scenario of technical education in India is now in a transformational phase as compared to earlier
times. We are in a compelling era where global conditions require conventional practices which
make one to change and adapt to suit the present requirements and also address futuristic needs. The
college is committed in enhancing the quality of service delivery, providing practical cum industrial-
oriented programs and ensuring a valuable campus environment for the faculty and students. With
the support of the Management, faculty members, staff and students are excelling in their work. The
holistic and comprehensive education provided in the College will enlighten the students and enable
them to face the challenging world. Research is the key parameter to promote the individuality to
horizon. In order to create the best engineers we have organized the international conference to
enhance the research activities of the budding engineers.
This proceeding of the conference has been documented with utmost care. I believe strongly that,
this will stand as a great source of knowledge and researchers. With immense pleasure and pride, I
welcome all the participants and convey my best wishes for ICCET 2022.
Dr. G Indira
Principal
Prince Shri Venkateshwara Padmavathy Engineering College
PRINCIPAL’S MESSAGE
th
I am indeed most delighted to chair this 10 International Conference on
Contemporary Engineering and Technology (ICCET 2022). The sharp, clear sighted
vision and precise decision making powers of our management has benefited our
college to stay competitive. The Pedagogy at the Institute is Modern where a variety
of learning, behavioural tools are used in quality pursuance of knowledge,
development of skills, attitudes, and values complemented by academia-industry
interface imparting uniqueness to our programme. The Institute focuses on the holistic
development of its students through variety of methodologies and extracurricular
activities the whole year round. Today, we live in an era of incredibly rapid
technological change. Technology has dominated our lives and we now have the ever
evolving technology at our finger tips. Symposium, Seminars and International
Conferences and Workshops are organized in the institute for their overall
development. Teaching and Research are the two primary activities through which we
fulfil our Mission and Objective. The Institute takes pride in welcoming
th the National and
International participants for 10 International Conference.
With a firm foundation of the past and high hopes for a bright future, I wish everyone
good luck and prosperity ahead. May we grow many technological wings!
VISION
The main aim of Prince Shri Venkateshwara Padmavathy Engineering College & Prince Dr. K. Vasudevan
College of Engineering & Technology is to meet the challenges and demand of the highly advanced scientific
and technological fields and to prepare to meet the man power needs of the world.
MISSION
Prince Matriculation Higher Secondary School,7,Kannagi Street, Madipakkam to Puzhuthivakkam, Chennai 091
Prince Sri Vari Vidyalaya CBSE School,93 ,College Road , Nanganallur, Chennai 114.
Prince Sri Vari Vidyalaya CBSE School, 12,Kannagi Street, Madipakkam to Puzhuthivakkam, Chennai 91 Shri
Prince Matriculation Higher Secondary School, 67&68, College Road, Nanganallur , Chennai 114.
ICCET 2022
PATRON-IN-CHIEF
Er.K.Parthasarathy, B.E,
CONFERENCE CHAIR
SPEAKERS
Dr. K. Aldrin Karunaharan, Assistant Professor, International Maritime College
Oman, Sohar, Oman
Dr. Sivakumar Krishnan, Professor & Dean and Former Principal, Rathinam
Technical Campus, Coimbatore, Tamil Nadu
Dr. Sivakumar Krishnan, Professor & Dean and Former Principal, Rathinam
Technical Campus, Coimbatore, Tamil Nadu
Dr. M.Jeyakarthic, Assistant Director, Tamil Virtual Academy, Anna
University, Chennai, Tamil Nadu
7 ICCET22006 CRIME DATA FORECASTING USING MACHINE LEARNING AND BIG DATA ANALYTICS
12 ICCET22035 AN APPLICATION SPECIFIC WEB-BASED DATABASE FOR INSTITUTIONAL DATA MANAGEMENT SYSTEM
13 ICCET22037 RANKING OF PARABOLIC TRAPEZOIDAL FUZZY NUMBER USING THE CENTROIDS AND FOCUS
14 ICCET22036 INSERTION OF TIE –BREAKING MECHANISM FOR FLOW SHOP SCHEDULING PROBLEM
17 ICCET22047 A DISTINCTIVE APPROACH FOR EARLY DETECTION OF PLANT DISEASE FOR SUSTAINABLE AGRICULTURE
A NEW MODEL BASED DESIGN AND PERFORMANCE ANALYSIS OF HIGH THROUGHPUT AND LOW
18 ICCET22039 LATENCY DA-FIR FILTER FOR EFFECTIVE NOISE REMOVAL IN SDR APPLICATIONS
TEACHING AID BASED ON CONTEXT ACTIVE CULTURAL BASED STUDY FOR LEARNING COMPILER DESIGN
19 ICCET22042 CONCEPT FOR STUDENTS
ANALYSIS OF KNN, LINEAR, RIDGE, LASSO, POLYNOMIAL REGRESSION AND SVM ALGORITHMS FOR
20 ICCET22034 MAXIMUM ACCURACY TO PREDICTING THE PRICE OF BITCOIN
23 ICCET22033 SMART DELIVERY BOX BASED ON TENSORFLOW OBJECT DETECTION AND RECOGNITION API
24 ICCET22044 A NOVEL ENSEMBLED DEEP LEARNING MODEL FOR BIOMEDICAL QUESTION CLASSIFICATION
FORECASTING OF CROP YIELD IN VARIOUS CLIMATIC ZONES OF KARNATAKA USING PREDICTIVE
25 ICCET22046 ANALYTICS
30 ICCET22069 DESIGN OF 243 LEVEL TRINARY LADDER MULTILEVEL INVERTER USING VHDL
37 ICCET22083 DESIGN OF FUSION DIGITAL PULSE WIDTH MODULATION IN QUANTUM DOT CELLULAR AUTOMATA
EMOTIONAL INTELLIGENCE FOR SUSTAINABLE GROWTH OF ENTREPRENEURS: A REVIEW STUDY
38 ICCET22086 CONNECTED WITH WORK-LIFE BALANCE
40 ICCET22090 PREDICTION ON FIELD CROPS YIELD BASED ON TIME SERIES ANALYSIS DEEP LEARNING MODEL
ENERGY-EFFICIENT AND BALANCED LOAD ROUTING APPROACH USING BALD EAGLE SEARCH
41 ICCET220119 ALGORITHM FOR PATH CONVERGENCE IN MANET
46 ICCET22072 PERSONALIZED RECOMMENDER SYSTEM USING SENTIMENT AND EMOTION ANALYSIS FROM TWEETS
47 ICCET220137 GROUP {1,-1,I,-I} CORDIAL LABELING SOME DUPLICATE GRAPHS
MODELING OF FILTERS FOR GRID CONNECTED VOLTAGE SOURCE INVERTER USED IN RENEWABLE
48 ICCET220110 ENERGY RESOURCES
51 ICCET220153 A RELIABLE DATA TRANSMISSION USING AN ADAPTIVE ROUTING PROTOCOL FOR FANETS
58 ICCET220155 RECOGNITION OF TRAFFIC INFORMATION WITH THE HELP OF SOCIAL MEDIA TWEETS
SENTIMENT ANALYSIS WITH SARCASM DETECTION USING OPTIMAL BIDIRECTIONAL LONG SHORT TERM
59 ICCET220189 MEMORY ON TWITTER DATA
IOT BASED DECISION SUPPORT SYSTEM FOR TELEHEALTH MANAGEMENT THROUGH DATA MINING FOR
60 ICCET220149 BIOMEDICAL EQUIPMENT
EFFECT OF SURFACE ROUGHNESS ON THE AERODYNAMIC AND AEROACOUSTIC PERFORMANCE OF THE
61 ICCET220187 DARRIEUS WIND TURBINE
62 ICCET220141 PCOD PREDICT FOR OBESE PATIENT USING NAFLD AND T2D PROFILES
66 ICCET220191 TRIPLE BAND U-SLOT ULTRA-WIDEBAND ANTENNA AS A WIRELESS SENSOR FOR COMMUNICATION
69 ICCET220185 ANALYSIS OF THE UPSHOT OF HEAT TREATMENT ON PROPERTIES OF MAGNESIUM HYBRID COMPOSITES
77 ICCET220130 MULTI-SOURCE MEDICAL DATA INTEGRATION AND MINING FOR HEALTHCARE SERVICES
86 ICCET220215 XGBOOST OPTIMIZED BY ADAPTIVE TREE PARZEN ESTIMATORS FOR CREDIT RISK ANALYSIS
A LIGHTWEIGHT RUBIK’S CUBE AND CHAOTIC-BASED IMAGE ENCRYPTION AND KEY GENERATION
87 ICCET220178 ALGORITHM FOR MULTIMEDIA INTERNET OF THINGS
89 ICCET220190 CLASSIFICATION OF YOGA HAND MUDRAS USING SIFT AND SURF FEATURES
91 ICCET220211 DETECTION OF FACE MASK AND DISTANCE CALCULATION USING DEEP LEARNING
107 ICCET220248C A NOVAL APPROACH FOR WSN USING SHORTEST PATH (DIJKSTRAS ALGORITHM)
109 ICCET220248E A TOURISM MANAGEMENT WITH IMAGE SEARCH SYSTEM USING PIXABAY
116 ICCET220242 SOCIAL IMPACT ASSESSMENT IN PROTECTED AREAS OF PANNA NATIONAL PARK, MADHYA PRADESH
119 ICCET220274 MEGAPSO: MOBILITY AWARE ENERGY EFFICIENT HYBRID GA & PSO BASED CLUSTERING FOR MANET
120 ICCET220238 WATER CONSUMPTION IN THE POWER SECTOR IN INDIA - PROBLEMS AND PROSPECTS
121 ICCET220283 RFID WIRELESS VEHICLES CHARGING STATION FOR ELECTRIC VEHICLES AND PAYMENT SYSTEM
122 ICCET220287 ASSESSMENT OF VARIOUS MILK PARAMETER MONITORING SYSTEM USING AN IOT
132 ICCET220298 IN SILICO INTERACTION STUDIES OF SALACINOL WITH INHIBITORS OF IAP PROTEINS
IN SILICO SCREENING OF SNP'S IN PRION PROTEIN AND COMPARATIVE STUDIES BETWEEN
PHYTOCHEMICAL COMPOUNDS THAT INHIBIT PRION PROTEIN CAUSING NEURO-DEGENERATIVE
133 ICCET220297 DISEASES.
MULTI-OBJECTIVE VIRTUAL MACHINE PLACEMENT USING ORDER EXCHANGE AND MIGRATION ANT
134 ICCET220307 COLONY SYSTEM ALGORITHM
136 ICCET220293 THIOPHENE AS A GAS SENSOR FOR THE ADSORPTION OF CARBONYL SULFIDE: DFT CALCULATIONS
139 ICCET220302 CLASSIFICATION OF PADDY AND TOMATO CROPS DISEASES DETECTION USING CNN
DEEP LEARNING AND SWARM INTELLIGENCE BASED SYSTEM FOR SMART AGRICULTURE USING
140 ICCET220437 WIRELESS SENSOR NETWORKS
145 ICCET220374 COVID-19 INDOOR SAFETY MONITORING SYSTEM USING MACHINE LEARNING
146 ICCET220327 SENTIMENT ANALYSIS ON USER REVIEWS AND TWITTER DATA TO PREDICT VEHICLE SALES
147 ICCET220325 CHILD ADOPTION BASED ON FACIAL FEATURES AND SKIN COLOR
151 ICCET220321 DESIGN AND DEVELOPMENT OF SOLAR WATER PUMP WITH DIFFERENT TIME SLOTS FOR POWER SAVING
152 ICCET220446 DETECTING PASSIVE ATTACKS IN FINGERPRINT SPOOFING USING CONVOLUTION NEURAL NETWORK
PREDICTION OF COVID-19 & PNEUMONIA BY USING CONVOLUTIONAL NEURAL NETWORK AND
153 ICCET220415 DEPLOYMENT BY USING THE WEB FRAMEWORK
164 ICCET220262 VOICE BASED EMAIL FOR BLIND USING ARTIFICIAL INTELLIGENCE AND PYTHON
167 ICCET220422 A BRIEF REVIEW OF IMAGE CAPTIONING METHODS USING DEEP LEARNING APPROACH
168 ICCET220368 DETECTION OF CYBER ATTACK IN NETWORK USING DIFFERENT MACHINE LEARNING APPROACHES
170 ICCET220342 BLOOD BANK MOBILE APPLICATION OF IOT-BASED ANDROID STUDIO FOR COVID-19
171 ICCET220408 VIRTUALLY CONTROLLING COMPUTERS USING HAND GESTURE AND VOICE COMMANDS
A UNIFIED APPROACH FOR DETECTING TRAFFIC ACCIDENT AND ANALYSING THE ACCIDENT PRONE ZONE
172 ICCET220449 USING QUANVOLUTIONAL NEURAL NETWORKS
177 ICCET220487 SMART ELECTRICITY DEMAND FORECASTING BY USING HYBRID ARIMA WITH LSTM ALGORITHM
178 ICCET220394 MODIFIED M-RCNN APPROACH (AOD-NET) FOR ABANDONED OBJECT DETECTION IN PUBLIC PLACES
182 ICCET220473 PREDICTION ON REAL ESTATE HOUSE PRICE USING REGRESSION MODELS
183 ICCET220445 DELAY NEURAL NETWORK ANALYSIS FOR LIP READING - NEURAL MACHINE TRANSLATION
194 ICCET220479 DEEP LEARNING BASED NEUROIMAGING ANALYSIS FOR PARKINSON’S DISEASE DETECTION
RECOMMENDATION SYSTEM FOR COLLEGE ELECTIVES USING ALS IMPLICIT COLLABORATIVE FILTERING
195 ICCET220513 AND LSTM NETWORK
198 ICCET220474 GESTURE RECOGNITION SYSTEM USING CONVOLUTED NEURAL NETWORKS AND TRANSFER LEARNING
201 ICCET220340 INDOOR MICRO AERIAL VEHICLE NAVIGATION USING OPTICAL FLOW
203 ICCET220407 SEISMIC RESPONSE CONTROL OF IRREGULAR RCC BUILDING USING BRACING SYSTEM
204 ICCET220570 PERFORMANCE ANALYSIS OF SPATIO- TEMPORAL HUMAN DETECTED KEYFRAME EXTRACTION
206 ICCET220582 FLY ASH AS MINERAL ADMIXTURE IN CONCRETE MATRIX – A STATE OF THE ART
213 ICCET220611 A REVIEW ON SECURE TECHNIQUES FOR KEYWORD-BASED SEARCH AND DATA SHARING
214 ICCET220641 DETECTING MALIGN REQUESTS USING HYBRID DEEP LEARNING MODEL WITH SEQUENCE-BASED LSTM
215 ICCET220679 LOW WEIGHTED HUMAN ACTIVITY RECOGNITION USING DEEP LEARNING
219 ICCET220529 IMPLICATIONS OF THE EXTERNAL FLOW AND ACOUSTICS ON LATERAL UPWARD SMOLDERING
221 ICCET220636 STUDENTS LIVE BEHAVIOUR MONITORING IN ONLINE CLASSES USING ARTIFICIAL INTELLIGENCE
228 ICCET220523 AN IMPROVED ECOURT SYSTEM WITH SUSPECT PREDICTION USING HAARCASCADE ALGORITHM
232 ICCET220658 SECURED BLOCKCHAIN TECHNOLOGY FOR AGRICULTURE FOOD SUPPLY CHAIN
237 ICCET220701 DECENTRALIZING ELECTRONIC MEDICAL RECORDS ON THE BLOCKCHAIN USING SMART COBTRACTS
243 ICCET220667 WHEEL RIM RADIAL FATIGUE LIFE ANALYSIS CONSIDERING STEERING GEOMETRY
250 ICCET220471 AN ENSEMBLE APPROACH FOR DETECTION AND CLASSIFICATION OF FAKE NEWS
253 ICCET220750 AN INTELLIGENT TRAFFIC LIGHT CONTROL SYSTEM USING CONVOLUTIONAL NEURAL NETWORK
257 ICCET220752 PREDICTION AND DETECTION OF FOREST FIRE BASED ON DEEP-LEARNING APPROACH
259 ICCET220621 INHIBITORY POTENTIAL OF NATURAL PLANT PRODUCTS AGAINST INFLUENZA VIRUS
267 ICCET220603 DECENTRALIZED SOCIALMEDIA APPLICATION WITH CHAT AND NFT MARKETPLACE
270 ICCET220318 METHODOLOGY TO IMPLEMENT HOME AUTOMATION SYSTEM USING FPGA BASYS 3 BOARD
278 ICCET220607 MODELLING A VOTING-BASED MODEL FOR DIABETES PREDICTION USING LEARNING MODELS
STUDY OF ELECTRO-MECHANICAL PROPERTIES OF FDM MATERIAL USING DIFFERENT COATING
279 ICCET220690 COMPOSITIONS
281 ICCET220632 DESIGN AND ANALYSIS OF SOLAR AND WIND BASED CHARGING STATION FOR ELECTRIC VEHICLES
REMOVAL OF CHROMIUM VI IONS FROM TANNERY EFFLUENT USING EMULSION LIQUID MEMBRANE
282 ICCET220683 AND OPTIMIZATION OF PARAMETERS USING RESPONSE SURFACE METHADOLOGY
283 ICCET220810 WASTE MANAGEMENT AND WEALTH GENERATION THROUGH WASTE ELIMINATION
290 ICCET220699 A MACHINE LEARNING BASED FAULT DETECTION FOR PREDICTIVE ANALYSIS OF MACHINE
296 ICCET220762 ANALYZING FACTORS AFFECTING YOUTUBE VIDEOS TO BECOME TRENDING VIDEO
297 ICCET220736 COVID-19 PREDICTION USING MACHINE LEARNING USING REAL WORLD DATA
COST EFFECTIVE, 3D PRINTED BINIC ARM MECHANICAL DESIGN CONTROLLED BY ELECTROMYOGRAPHIC
298 ICCET220561 SIGNALS
300 ICCET220749 MACHINE LEARNING APPROACH TO CLASSIFY AND PREDICT OSTEOSARCOMA GRADING
301 ICCET220767 ROAD SURFACE CLASSIFICATION THROUGH VEHICLE VIBRATION SINGAL PROCESSING
PREPARATION OF HEAT RESISTANCE AND FIRE-RETARDANT COATING USING SILICONE POLYESTER RESIN
302 ICCET220789 DOPED WITH AL2O3
306 ICCET220267 ROLE OF INTELLIGENT CAD SYSTEMS FOR REAL WORD APPLICATIONS - A REVIEW
310 ICCET220578 ONLINE PROCTORING SYSTEM USING IMAGE PROCESSING AND MACHINE LEARNING
313 ICCET220913 AUGMENTED ANALYTICS: A REVIEW OF CURRENT TRENDS AND FUTURE CHALLENGES
321 ICCET220581 DESIGN OF HEART RATE EQUIPMENT BASED ON IOT WHILE RIDING VEHICLE
324 ICCET220962 A REVIEW AND PROPOSAL OF AN INNOVATIVE APPROACH FOR E-LEARNING PLATFORM
325 ICCET220935 CONVERSION OF SIGN LANGUAGE INTO TEXT AND SPEECH USING DEEP LEARNING
THERMAL DEGRADATION OF POLYVINYL CHLORIDE (PVC) MODIFIED BY HYDROXYAPATITE NANO
PARTICLES
326 ICCET220838
BRAIN DISEASE CLASSIFICATION & BRAIN TUMOR ESTIMATION USING CNN
327 ICCET220900
329 ICCET220745 CONTACTLESS COVID TESTING BOOTH WITH PATIENT TRACKING AND MONITORING
330 ICCET220454 CROP YIELD PREDICTION IN SMART FARMING USING MACHINE LEARNING
333 ICCET220663 FLOOD INTENSITY PREDICTION VIA ENSEMBLE MACHINE CODE MODEL
342 ICCET220957 IOT-BASED SYSTEM FOR DETECTING AND FORECASTING INDUSTRIAL FIRE
343 ICCET220799 FRICTION STIR WELDING OF ALUMINIUM ALLOY PLATES WITH THREADED PIN TOOL: A REVIEW
346 ICCET220726 DATA SECURITY AND PRIVACY PROTECTION FOR CLOUD STORAGE
347 ICCET220949 DRIVER'S DROWSINESS DETECTION USING DEEP LEARNING
349 ICCET220754 BLIND IMAGE QUALITY ASSESSMENT WITH IMAGE DENOISING: A SURVEY
352 ICCET220778 BIOCATALYTIC POTENTIAL OF PROTEASE AND AMYLASE ENZYME ON WASTE TANNERY EFFLUENT
354 ICCET220626 EFFECTIVE TAMIL HANDWRITTEN CHARACTER RECOGNITION USING DEEP LEARNING TECHNIQUE
ADAPTIVE AND INTEGRATED TEXT MINING FOR ASSESSING MASSIVE OPEN ONLINE COURSES (MOOC)
355 ICCET220782 USING VECTOR SPACE MODEL
361 ICCET220756 SECURITY LEVEL DETECTION OF VARIOUS CRYPTOSYSTEMS USING MACHINE LEARNING MODEL
364 ICCET220367 REAL AND FAKE NEWS CLASSIFICATION USING NATURAL LANGUAGE PROCESSING
365 ICCET220923 A SURVEY OF CYBER CRIMES AND CYBER SECURITY
367 ICCET220682 IOT BASED REAL-TIME HEALTH CARE MONITORING SYSTEM FOR COMPLEX EVENT PROCESSING
368 ICCET220917 DESIGN AND IMPLEMENTATION OF INTEGRATED EVACCINATION CHIP FOR COVID-19
369 ICCET221061 CHARACTERISTIC ANALYSIS OF OFDM-OQAM SYSTEM IN BELOW DECK SHIP ENVIRONMENT
A XTREME FEATURE-BASED BOOSTING MODEL FOR HEART DISEASE PREDICTION USING FEATURE
370 ICCET220920 REPRESENTATION
371 ICCET221062 HEART RATE MONITORING , HEART ATTACK DETECTION AND PREDICTION
DEVELOPMENT OF NON-INVASIVE CONTINUOUS PATIENT GLUCOSE BOTTLE LEVEL AND HEALTH CARE
372 ICCET220992 MONITORING SYSTEM USING IOT
374 ICCET220829 TEXTURE BASED CLASSIFICATION OF LIVER CANCER USING ULTRASOUND IMAGES
383 ICCET221018 PROSTATE CANCER DETECTION USING DEEP LEARNING & TRADITIONAL TECHNIQUES
387 ICCET220828 MORPHOLOGICAL DESCRIPTORS BASED URBAN CHANGE DETECTION USING REMOTE SENSING IMAGES
NUMERICAL INVESTIGATION OF FLOW OVER AN OSCILLATING CIRCULAR CYLINDER AT LOW REYNOLDS
388 ICCET220939 NUMBER
389 ICCET221072 INVESTIGATION OF FIBRE-BASED BAG FILTER COATED WITH METAL OXIDES FOR DUST ADSORPTION
NUMERICAL ANALYSIS OF FLUID FLOW OVER PLUNGING NACA0012 AIRFOIL AT LOW REYNOLDS NUMBER
390 ICCET220952
391 ICCET221028 DESIGN OF EFFICIENT TOPOLOGY IN TIME EVOLVING AND ENERGY HARVESTING
395 ICCET220965 FACE RECOGNITION AND ATTENDANCE MARKING USING MACHINE LEARNING
A NEW OTA-BASED SHADOW FILTER PROVIDING INDEPENDENT ELECTRONIC CONTROLS OF Ω0 AND
396 ICCET221057 BANDWIDTH
401 ICCET221015 A NEW COMPUTATIONAL INTELLIGENCE APPROACH TO UNDERSTAND AUTISM SPECTRUM DISORDERS
402 ICCET220827 IOT BASED CONSERVATION AND MONITORING OF NATURAL RESOURCES IN DAY-TO-DAY LIFE
405 ICCET220931 MRI SEGMENTATION OF LUNGS USING LEARNED SEMANTIC KNOWLEDGE AND GRAPH CUTS
412 ICCET221031 DESIGN AND IMPLEMENTATION OF AN AUTOMATED AGRICULTURE MONITORING AND CONTROL
413 ICCET220219A SURVEY ON AI BASED CAR PARKING SYSTEM
FRAMEWORK FOR NETWORK THROUGHPUT MAXIMIZATION TO PROLONG LIFE TIME OF WIRELESS
414 ICCET220990 SENSOR NETWORKS
415 ICCET221124 SOLAR IRRADIANCE VALUE BASED OPTIMAL OPERATING ELECTRIC ASSEMBLY DESIGN
417 ICCET221042 A VANET BASED ACCIDENT DETECTION AND MANAGEMENT SYSTEM IN A SMART CITY
418 ICCET221118 SENTIMENT ANALYSIS OF TWITTER DATA REGARDING RUSSIA UKRAINE WAR
424 ICCET221078 FRICTION STIR WELDING OF ALUMINIUM ALLOY PLATES USING CYLINDRICAL TOOL: A REVIEW
432 ICCET221110 AGRICULTURE OPTIMIZATION AND LIFE ANALYSIS OF A PLANT USING IOT
436 ICCET221159 A SYSTEMATIC LITERATURE REVIEW ON DEEP LEARNING BASED MEDICAL IMAGE SEGMENTATION
437 ICCET21176 IOT BASED ASSIST DEVICE FOR MONITORING STROKE PATIENT
441 ICCET221190 SMART APPLICATION BASED PARKING SYSTEM USING INTERNET OF THINGS
442 ICCET221127 DESIGN AND DEVELOPMENT OF A NOVEL ACCIDENT DETECTION AND EMERGENCY REPORTING SYSTEM
BIO-CERAMIC COATING FOR KNEE IMPLANTS FOR BETTER INTERFACE BETWEEN BONE TISSUES AND
443 ICCET221166 TITANIUM METALS
445 ICCET221164 ANOMALY BASED INTRUSION DETECTION SYSTEM USING HYBRID MACHINE LEARNING ALGORITHMS
446 ICCET221084 IOT BASED INDUSTRIAL ADOPTATION CONTROL FOR USING WIND ENERGY CONVERSION SYSTEM
448 ICCET221225 PROTECTING CROPS FROM WILD AND DOMESTIC ANIMALS INTRUSION USING DEEP LEARNING
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM USING DEEP LEARNING ALGORITHM AND IMAGE
449 ICCET221004 PROCESSING TECHNIQUES
450 ICCET221193 SYSTEMATIC INVESTIGATION ON CLOUD ASSISTED IOT DEVICES, CHALLENGES AND APPLICATIONS
CARBON EMISSION CONSIDERATION IN A FUZZY INVENTORY MODEL UNDER HYBRID PAYMENT POLICY
451 ICCET221157 AND TRADE CREDIT FINANCING
458 ICCET221231 STUDY ON EFFECT OF FOUNDATION SOIL ON MASS IRREGULAR BUILDINGS UNDER SEISMIC LOADS
461 ICCET221177 SMART PORTABLE DUSTBIN WITH METHANE DETECTOR USING NODE MCU
A SMART CONTRACT BASED ACCESS CONTROL FRAMEWORK FOR CLOUD BASED SMART HEALTHCARE
462 ICCET220775 SYSTEM
463 ICCET221233 A BRIEF REVIEW OF E-NOSE FOR QUALITY ANALYSIS OF MATERIALS IN DIFFERENT CATEGORIES
SIMULATING SUBJECTIVE OPINIONS ON WOMEN’S SAFETY IN HIGHER EDUCATION CAMPUSES USING AN
464 ICCET221079 ARTIFICIAL INTELLIGENCE-DRIVEN DESIGN FRAMEWORK
466 ICCET221161 AUTO ATTENDANCE SYSTEM FROM SINGLE IMAGE OF THE CLASSROOM USING FACE RECOGNITION
A USER EXPERIENCE STUDY ON RESPONSIVE MOBILE TOURISM WEBSITES' PERCEIVED USABILITY,
467 ICCET221133 ATTRACTIVENESS, AND INTUITIVENESS
469 ICCET221168 AGRO DIRECT SELLING APP WITH VOICE BASED CHATBOTS
474 ICCET221153 HUMAN-COMPUTER INTEACTION: CONTROLLING MOUSE FUNCTIONALITIES USING HAND GESTURES
475 ICCET221140 RECOGNITION OF WHEAT LEAF DISEASE USING TENSOR FLOW AND KERAS
476 ICCET221247 SMART ONLINE BOOKING SYSTEM THROUGH HAND GESTURE RECOGNITION
479 ICCET221106 DEVELOPMENT OF AUTOMATIC POSTAL PARCEL COLLECTOR WITH PINCODE BASED SEGREGATION
SEGMENTATION AND CLASSIFICATION APPROACH TO IMPROVE BREAST CANCER SCREENING USING
480 ICCET221234 HISTOPATHOLOGICAL IMAGES
481 ICCET221154 SMART SOLAR PANEL CLEANING SYSTEM USING IOT
MUSIC RECOMMENDATION SYSTEM USING SENTIMENT ANALYSIS THROUGH HAAR CASCADE IN
482 ICCET221245 MACHINE LEARNING
485 ICCET221226 AN ALTERNATIVE METHOD FOR NON-INVASIVE GLUCOSE DETECTION USING FTIR SPECTROSCOPY
USABILITY STUDY ON VIRTUAL FITNESS APPLICATION USING ARTIFICIAL INTELLIGENCE AND DEEP
486 ICCET221237A LEARNING
489 ICCET221128 A SYSTEMATIC ASSISTANCE FOR FOOD WASTAGE REDUCTION USING MOBILE APPLICATION
492 ICCET221076 PERFORMANCE ANALYSIS OF IMAGE RESTORATION FILTERS FOR TEXTUAL IMAGES
493 ICCET221172 PERKSUITY - GET CONTROL AND BENEFITS FOR YOUR DATA
494 ICCET221156 TRAFFIC SIGN RECOGNITION AND ACCIDENT PRONE ZONE INDICATION IN AUTONOMOUS CAR
495 ICCET221207 INVESTIGATION OF FAULTLESS STRESS LEVEL MONITORING SYSTEM USING ARTIFICIAL ALGORITHMS
498 ICCET221221 BED FALL DETECTION AND PREDICTION FOR ELDERLY PEOPLE
499 ICCET221238 DEVELOPMENT OF AN AUTOMATIC PATHWAY DIVERTER FOR THE COUNT BASED CONVEYOR BELTS
4D PRINTING USING FUSED DEPOSITION MODELLING MECHANISM FOR SHAPE MEMORY POLYMER:
500 ICCET221170 REVIEW
USING 3D PRINTING TECHNOLOGY FOR PRE-OPERATIVE SURGICAL PLANNING AND TRAINING FOR
501 ICCET221220 OPTICAL NERVE DISEASES
503 ICCET220793 ADVANCED HYBRID SOLID PROPELLANT COMPOSITION(S) FOR FUTURISTIC MISSILE TECHNOLOGY
504 ICCET221087 AUTOMATIC PATHWAY DIVERTER FOR CONVEYOR IN PACKING SECTION OF CEMENT FACTORY
TRANSFER LEARNING WITH VGG16 AND RESNET50 FOR LUNG MALIGNANCY CELLS CLASSIFICATION AND
505 ICCET221212 COMPARING ITS PERFORMANCE VIA EVALUATION METRICS.
507 ICCET221246 ASSESSMENT OF POST-FIRE CHANGES IN FOREST COVER USING SATELLITE IMAGE PROCESSING
510 ICCET221009A ATTEMPT TO CLASSIFY TREE SPECIES USING MACHINE LEARNING ALGORITHM WITH SPATIAL DATA
511 ICCET221197 A NOVEL METHOD FOR FAULT DETECTION AND PROTECTION IN SOLAR PHOTO VOLTAIC ARRAYS
512 ICCET221196 BIG DATA ANALYSIS FOR HEART FAILURE: DETECTION, PREVENTION AND PREDICTION
REVIEW: COMPARISON OF PARAMETER ANALYSIS OF RING OSCILLATORS FOR MEASUREMENT OF DELAY
513 ICCET221163 TIME
DIVERSE OBSERVER'S STANPONIT ON THE EXTRATERRESTRIAL INTELLIGENCE - A HYPOTHETICAL
514 ICCET220781 NOTION
518 ICCET221243 DETECTION OF MAN IN THE MIDDLE ATTACK IN 5G IOT USING MACHINE LEARNING
DIFFERENT LEVEL MULTI MEDIA CONTENT DELIVERY SYSTEM BASED ON ADVANCE WATERMARK
519 ICCET221204 ALGORITHMS
520 ICCET221351 CREDIT CARD FRAUD DETECTION USING DYNAMIC BAYESIAN NETWORK
521 ICCET221195 SIGNATURE AND FORGERY VERIFICATION USING CONVOLUTIONAL NEURAL NETWORK
3D DENTAL PROSTHETIC TOOTH CROWN: DESIGNING AND RE-MODELLING OF CUSTOMIZED TOOTH
522 ICCET221181 CROWN USING ADDITIVE MANUFACTUREING
523 ICCET221291 MONITORING THE TEXTILE WASTE WATER TREATMENT BY USING NATURAL RESOURCES
DEEP LEARNING APPROACH FOR ECG –.BASED HEARTBEAT CLASSIFICATION FOR ARRHYTHMIA
524 ICCET221285 DETECTION
527 ICCET221213 DEVELOPMENT OF EMBEDDED CUM AI BASED SMART HELMET FOR UNDERGROUND MINERS
529 ICCET221217 COMPUTER BASED DIAGNOSIS AND CLASSIFICATION OF SKIN DISEASES IN DERMOSCOPIC IMAGES
534 ICCET221277 DESIGN AND ANALYSIS OF COMPACT MICROSTRIP PATCH ANTENNA FOR 5G APPLICATIONS
539 ICCET221178 SMART BAG FOR WOMEN'S SAFETY USING EMBEDDED SYSTEM
540 ICCET221368 PERFORMANCE ANALYSIS OF ENHANCED LIGHTWEIGHT ALGORITHM FOR IOT DEVICES
541 ICCET221276 ECG–BASED HEARTBEAT CLASSIFICATION FOR ARRHYTHMIA DETECTION USING TRANSFORMER MODEL
ON-SITE WASTE MINIMIZATION PRACTICES AND EFFECTIVE QUALITY MANAGEMENT AS A WAY OF
542 ICCET221289 REDUCING ENVIRONMENTAL FOOTPRINT OF THE CONSTRUCTION INDUSTRY: A REVIEW
545 ICCET220670 PRAGMATIC ANALYSIS OF E-COMMERCE SUCCESS FACTORS AND DESIGN ATTRIBUTES
546 ICCET221362 PNEUMONIA DETECTION FROM CHEST X-RAY IMAGES BASED ON CONVOLUTIONAL NEURAL NETWORK
GRID AND RENEWABLE ENERGY SOURCE DRIVEN INDUSTRIAL MOTOR WITH POWER FLOW
547 ICCET221293 MANAGEMENT
549 ICCET221295 ANALYSIS OF A PROJECT COST OVERRUNS AND DELAYS USING RII METHOD
FINITE ELEMENT MODELLING AND SIMULATION OF GLASS FIBRE REINFORCED INDUSTRIAL SAFETY
550 ICCET221357 SHOES USING ANSYS
552 ICCET221271 SKIN CANCER DIAGNOSIS USING AI COUPLED WITH IMAGE PROCESSING
554 ICCET221298 AUTOMATIC CLASSIFICATION OF EVENT RELATED POTENTIAL USING NEURAL NETWORK
555 ICCET221274 STUDY AND ANALYSIS OF VARIOUS CONTROL ALGORITHMS FOR COUPLED TANK SYSTEM
558 ICCET221367 ENHANCE DETECTION AND SECURITY IN ATM USING HAAR CASCADE ALGORITHM
559 ICCET221362A A SURVEY ON FLIPPING AND PICK-AND-PLACE MECHANISMS USED IN THEFIELD OF ROBOTICS
EVALUATING THE THERAPEUTIC POTENTIAL AND EFFECTIVENESS OF EXTENDED REALITY EXPOSURE
560 ICCET221251 THERAPY IN THE TREATMENT OF PHOBIAS AND EMOTION REGULATION
INVESTIGATIONS ON THE COUPLED EFFECT OF SPRAY BURNER AND FLUIDIC PARAMETERS ON THE
561 ICCET221364 ONSET OF COMBUSTION INSTABILITY IN SPRACE PROPULSION
563 ICCET221306 PHOTO VOLTAIC POWER FORECASTING USING REGRESSION ANALYSIS FOR POWER SYSTEMS
564 ICCET221258 ADVANCE HYBRID SOLID PROPELLANT FOR FUTURISTIC MISSILE TECHNOLOGY
566 ICCET221364A INTELLIGENT CRUTCH TOOL FOR BODY POSTURE MANAGAEMENT SYSTEM USING IOT
568 ICCET221242 MULTI OUTPUT FLY BACK CONVERTER USING SOLAR ENERGY
571 ICCET221354A FACE RECOGNITION BASED ATTENDANCE MANAGEMENT SYSTEM IMAGE PROCESSING
572 ICCET221367B COMPARATIVE STUDY OF ENSEMBLE METHODS FOR CLASSIFICATION IN HEALTHCARE DATA
576 ICCET221356 ASSESSMENT OF SOIL MOISTURE PROFILE USING SMART REMOTE SENSING AND IOT TECHNIQUES
DESIGN OF VEDIC MULTIPLIER USING QUANTUM DOT CELLULAR AUTOMATA FOR CRYPTOGRAPHIC
577 ICCET221256 APPLICATIONS
578 ICCET221379 ANALYSIS OF FORENSIC IMAGES DETECTION FOR SUPERIMPOSED OF AN IMAGE AND OTHER IMAGES
579 ICCET221375 ADVERSE DRUG REACTION ANALYSIS USING SUPPORT VECTOR MACHINE MODEL
580 ICCET221382 ARTIFICIAL INTELLIGENCE AND TELEGRAM CHAT-BOT BASED INTELLIGENT AUTHENTICATION SYSTEM
CLOCK BASED TRANSMITTER IDENTIFICATION AND ATTACK RECOGNITION USING INTRUSION
581 ICCET221385 DETECTION
586 ICCET221282 QOS ENABLED LOAD BALANCING IN CLOUD USING GREY WOLF OPTIMIZATION ALGORITHM
1 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
In the modern world antenna plays a very vital role in the field of communication, the Ultrawide band
antenna uses many types of wireless sensor applications. The proposed design consist of a circular
microstrip patch antenna with diamond shaped slot is designed using jeans substrate material, it gives
the good sensing in wireless communication at the resonance frequency of 9.5 GHz in the UWB range
3.1GHz to 10.6GHz. The Specific Absorption Rate SAR value of an antenna in the acceptable range,
it can be calculated with the Human Phantom. Hence the proposed UWB antenna gives the good
VSWR, return loss and gain value compared with various UWB designs. the antenna gives good
candidature for wireless sensor applications.
This study provides an in-depth analysis of the public perceptions on Citizenship Amendment Act-
(CAA) portrayed in the media. In a multicultural context, the media and their activities are generally
seen as the most important and strategic tool for information flow far the government and
policymakers and their actions and activities. Although the media has a certain influence on public
policy, it is often hard to see how much it magnifies or restricts / censors messages sent to the public
regarding specific policies. The main purpose of this research is to assess the extent of media influence
on various public policies on audiences. This research not only examines the specific cases of the
CAA’s Media Coverage but also seeks to gain publics feedback on the coverage. Furthermore, this
research examines how observers perceived the way media responded and acted on the coverage the
controversial bill -CAA while it was passed in the Parliament. Here this study analyzes the CAA's
media coverage and its impact on audiences. The research further assesses how multilayer perception
is measured and thereby how the media responds to messages that are of public interest to the audience.
Although this study raises a particular issue of audience perception of media coverage in the CAA and
its aftermath which have caused widespread debate in the public sphere. But a limited amount of
research has been conducted on this subject.
Decades of research in shocks and boundary layer interaction of conventional airfoil has yielded many
technical solutions. The primary objective of this review paper is to focus on the early design and
development of supercritical airfoil and its influence on improving lift coefficient, drag reduction and
pressure distribution in high subsonic speed aircraft. The stall effects and buffeting phenomena due to
unsteady flow field are analyzed using the Reynolds average Navier–Stokes equation (RANS). This
paper reviews studies that optimized airfoil shape with increased lift and reduced drag to maximize
its applications in aeronautical and aerospace industries.
In wireless body area network WBAN technology, the most common and difficult task is continuous
health monitoring. The proposed design's major goal is to achieve low specific absorption rate SAR
value and to get excellent communication in wireless sensor environment. an antenna is a most
common communicating equipment in the digital era with its unique designs and excellent findings.
The design approach is appropriate to create a new horizontal T-shape slot in a rectangular patch UWB
microstrip patch antenna for wearable applications and the antenna was simulated using a
highfrequency structure simulator utilising a textile material, denim substrate. The designed antenna
resonates at 7.7GHz with acceptable gain of 4dB. Radiation pattern was measured using anechoic
chamber and the antenna gives the good return loss, better bandwidth, a VSWR of 1.05 also the
specific absorption rate SAR value of the UWB antenna is below 2W. The result shows that proposed
design satisfies the requirements for a textile wearable antenna used for continuous health monitoring
in wireless body area network, sports and military applications.
Incomplete fuzzy soft sets is of paramount importance in fuzzy soft sets, where the combination of
incomplete fuzzy soft set and decision-making problem is of great significance. The focus of this paper
to propose an algorithm of fuzzy soft set-based decision- making problems under incomplete
information. To obtain the best feasible solution of these problems, we have to consider various
parameters related to the solution. we apply incomplete fuzzy soft set to deal with decision-making
and propose a Sanchez’s algorithm to make it more accurate and simpler.
In this paper a procedure based on fuzzy one point method is proposed to solve fuzzy transportation
problems where the transportation cost, supply and demand are taken s Pentagonal fuzzy numbers.
Numerical Examples are illustrated to demonstrate the proposed approach in detail.
Big data analytics (BDA)” is a system based method with an aim to recognize and examine different
designs, patterns and trends under the big dataset. In this paper, BDA is used to visualize and trends
the prediction where exploratory data analysis examines the crime data.”A successive facts and
patterns have been taken in following cities of California, Washington and Florida by using statistical
analysis and visualization”. The predictive result gives the performance using Keras Prophet Model,
LSTM and neural network models followed by prophet model which are the existing methods used to
find the crime data under BDA technique. But the crime actions increases day by day which is greater
task for the people to overcome the challenging crime activities. Some ignored the essential rate of
influential aspects. To overcome these challenging problems of big data, many studies have been
developed with limited one or two features. “This paper introduces a big data introduces to analyze
the influential aspects about the crime incidents, and examine it on New York City. The proposed
structure relates the dynamic machine learning algorithms and geographical information system (GIS)
to consider the contiguous reasons of crime data. Recursive feature elimination (RFE) is used to select
the optimum characteristic data. Exploitation of gradient boost decision tree (GBDT), logistic
regression (LR), support vector machine (SVM) and artificial neural network (ANN) are related to
develop the optimum data model. Significant impact features were then reviewed by applying GBDT
and GIS”. The experimental results illustrates that GBDT along with GIS model combination can
identify the crime ranking with high performance and accuracy compared to existing method.”
In most railway stations, the lines of waiting passengers are always very long. The M/M/Z/: FCFS
model is changed into M/M/1/: FCFS in this study to determine which is more efficient, a single line
or several lines. Here, we create an optimization model for queuing and then determine the best model
for queuing. The outcome of analysis was effective and realistic of these factors.
Majumder and Samanta initiated the notion of generalized fuzzy soft set and in recent times application
of generalized fuzzy soft sets in solving decision problems is a catching momentum. Generalized fuzzy
soft set theory is a powerful tool for decision making. In our work, an attempt has been made to apply
the concept of generalized fuzzy soft set in student ranking process. Student’s ranking provides a clear
picture to students, parents, teachers and other concerned persons. It creates a healthy competition
among the students. A new technique for students ranking is introduced in this paper based on
generalized fuzzy soft matrix theory.
The alternate method for the CMOS technology based electronics circuit design with significant
reduction in size is the novel nano scale technology referred as Quantum-dot Cellular Automata
(QCA). Though there are many manipulation circuits, the Arithmetic Logic Unit is a integral
component of the Central Processing Unit to perform the arithmetic and logical calculations. In this
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
5 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
work, a novel T-Flip Flop circuitry is proposed for the design of the synchronous counter with 3 bit
resolutions. The QCAD Designer tool is used to develop the novel T-FF and its utilization in the
counter design. The simulation results exhibits that the proposed QCA design performs effectively.
Keywords: Quantum-dot Cellular Automata (QCA), T-Flip Flop, Digital Counter Circuit.
McKinsey’s hot pursuit for talent has triggered diverse studies in talent management. Managing and
retaining talented people have become the greatest challenge for employers. Managers, seen as
superiors as well as the organization’s representative, are the closest link to human assets. As change
makers, managers who nurture a positive culture in an organization, benefit the organization in the
long-term. To bring about positive changes in the organization, we propose that managers’ positive
involvement in career planning and skills training would inculcate a positive attitude towards the
organization and enhance employee development. A systematic probe of IT professionals, using
structural equation model, shows that managers involvement in career planning and employee
development have a sustained effect on fostering positive attitude towards an organization.
This Most educational institutes admit thousands of students, yearly, into various programs and
employ faculty who guide and mentor these students. Such institutions require a well-organized and
efficient solution for the management and maintenance of all the information pertaining to them. This
paper elaborates on the database system design that allows for the storage and retrieval of information
of various departments, faculty and students of the college and it also highlights the details of the web
portal created as a user interface for the database. With this system, one can enter large amounts of
data into the database, update it regularly, retrieve and download the data all through the easy to use
and understand web portal. This way all information of the college is digitized, secure and centralized
which enables ease of access to anyone in the college. The database also has various levels of security
so the users can access information only if the related permissions are granted. Such a system can do
away with the unreliable and traditional method of maintaining information on paper while also
keeping the process just as simplified so the burden on the workers are lessened but the quality of the
work remains unhindered.
Fuzzy set theory has a wide range of application in all fields. Many researchers have developed a
different type of fuzzy numbers and its membership function. The fuzzy membership function attains
the highest value only between the intervals. The fuzzy numbers are parabolic once they obtain the
highest value at the midpoint of an interval and is referred as parabolic fuzzy number. Here a new
ranking of centre of centroids and focus of the parabolic ranking trapezoidal fuzzy numbers has been
developed. So, the parabolic fuzzy number is transformed into a crisp number using new ranking
methods.
This paper deals with Tie –Breaking mechanism applied in NEH technique for four machines and
four job problem in a Flow Shop Scheduling. To obtain a optimal sequence in NEH technique
TieBreaking mechanism plays an vital role. Job sequential order is same for all machines in
Permutation flow-shop scheduling problem(PFSP). The possible number of sequence is (n!)m. Since
the number of machine is four, the problem can be taken as NP-complete. Numerical illustrations are
provided to understand the NEH algorithm easily
Soldiers are the backbone of our Nation’s protection. They guard us despite any worse situations. But,
nowadays the life of the ones who are guarding us day and night is at stake. One of the crucial
challenges in the military operations is that the soldiers are not able to communicate with the control
station. Herein, a soldiers monitoring and tracking system based on Internet of Things (IoT) is
proposed to monitor and track the soldiers in the war-field. In this proposed system design, PIC
controller (16F877A) is used for sensor interfacing and for communicating with the server unit using
IoT. The main aim of this system is to track the health status like body temperature, heart and blood
oxygen rate of the soldiers and also to monitor the environmental parameters like air quality of the
war-field using wireless sensor network. The proposed system also comprises of a LCD which
displays the normal/abnormal results of the sensors and a keypad which is programmed to send instant
commands like mentioning the necessity of man power and weapons or rescue them in case of
emergency in the war-field. It sends GPS location of the soldiers using IoT Module from soldier unit
to the server unit when there is a variation in the sensors result. The GPS location and the instant
commands are received and displayed in the PC in the server unit. With the utilization of this proposed
hardware, it is possible to execute a system that ensures the safety of soldiers on the war zone.
Agriculture has always been the primary resource in producing food. Plant disease has been a major
factor influencing the food production. If there are low yields and less stock of food, and a disease
epidemic occurs then food shortage can easily develop resulting in worst effects on human society.
So, it is essential to deal with the identification of the plant diseases as early as possible to avoid low
crop yield because of diseases. Because of the rapid devel-opment of the Smart Farming, the
identification of the plant disease becomes data driven enabling smart analyses. In this context, Deep
Learning algorithms is used for disease identifi-cation. So, a mathematical model of plant disease
classification and its findings are proposed. The proposed work consist of two layers namely
Preprocessing Layer and Fully Connected Layer (FC). The Pre-processing Layer is for Feature Map
extraction and the Fully Connected Layer is Neural Network. The model is trained using larger dataset
of diseased leaves and healthy leaves and it is tested against random samples. The proposed model
obtained 97% of accuracy in classification and recognition of various plants.
A software-defined radio (SDR) allows for digital communication systems to easily adopt more
sophisticated coding and modulation technologies, which is extremely important in meeting the
everincreasing demands of the wireless communication industry. In this paper, we have analyzed the
Design of Efficiency in FIR filter using faster multiplier and faster adder and verification on Artix-7
FPGA. Design of channel equalizer which is part of the SDR application is applied to FIR for
validation to minimize the BER and Latency, and to improve the throughput. Here, through decimation
factor, frequency response for filter output is changed dynamically without changing filter
coefficients. The High configurable parallel prefix adder can be used to narrow down the worst case
critical path delay during partial product accumulation. The number of LUT’s can be reduced here
based on FIR. The number of coefficients that can access parallel for performing FIR filter operations
can be reduced to reduce delay and memory.
Context awareness (CA) alludes to frameworks can both sense and respond based on their
environment. We present a complete description of a project for a compiler called Compiler Evaluator
Module (CEM) that generates intermediate representations for each of the phases in the design of a
compiler. A Table driven parsing model for Lexical and Syntax Analysis phase. An annotated parse
tree for a given Syntax Directed Definition using suitable data structures and algorithms. The
syntaxdirected interpretation procedures will be connected to sort checking and intermediate-code era.
The most application is the development of sentence structure trees. Since a few compilers utilize
language structure trees as a middle representation, a common frame of Syntax Directed Definition
turns its input string into a tree. To complete the translation to intermediate code, the compiler may
then make the syntax tree, using another set of rules that are in effect a Syntax Directed Definition on
the syntax tree rather than the parse tree. All these translations are designed through game based
learning [3] for the students with Learning Disabilities like slow learners, hyper active students who
can’t concentrate.
Dr.P.A.Selvaraj 1
Associate Professor
Department of Computer Applications
Kongu Engineering College
Perundurai, Erode,
Tamilnadu, India.
Dr. M.Jagadeesan2
Associate Professor
Department of Computer Applications
Kongu Engineering College
Perundurai, Erode,
Tamilnadu, India.
Mr.K.Jayasurya 3
PG Scholar
Department of Computer Applications
Kongu Engineering College
Perundurai, Erode,
Tamilnadu, India.
Ms.K.Karthika 4
PG Scholar
Department of Computer Applications
Kongu Engineering College
Perundurai, Erode,
Tamilnadu, India,
Mr.K.P.Rajkumar 5
PG Scholar
Department of Computer Applications
Kongu Engineering College
Perundurai, Erode,
Tamilnadu, India.
Bitcoin has become the most valuable crypto currency in recent years. Bitcoin values, on the other
hand, have been extremely volatile, making them extremely difficult to forecast. As a result, the goal
of this study is to use machine learning linear regression models to train the dataset and then use Grid
Search to find the best scaling parameter and discover the most efficient and accurate model to predict
Bitcoin prices from various machine learning algorithms such as KNN regression, linear regression,
Ridge, Lasso, polynomial regression, and SVM, both simple and with kernels, for predicting the
accuracy of 94 percent of the bitcoin market price.
Sewerage system plays an important role to keep the city clean. The traditional Drainage Monitoring
System failed to acknowledge in the field of alerting the people about the gas explosion, increase in
the water level and the opened lid. This system directly impacts on health issues of citizens and worker
who cleans the underground drainage. The proposed system is low cost, less maintenance, long life
and web based real time system, which update the municipal officer by text communication when any
manhole crosses the threshold value. Thus, the proposed system predicting the dangerous situations
in drainage system.
The machine learning has immense potential to amplify diagnostic and interference research in the
behavioral sciences. It may be instrumental in research involving the highly frequent and varying
syndrome of autism spectrum disorder. However, ML chatbots in the absence of clinical domain
specialists or physicians are questionable and lead to fabricated closures. We conclude with proposed
better practices while using ML in researches related to autism and highlight some up-and-coming
areas for collective work at the intersection of behavioral and computational sciences. As in the recent
years show the growing popularity of chatbots in the absence of the physician in health care industries,
with latest efforts aiming to make them more empathic and humanlike, finding applications, for
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
11 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
example, in health care service or in treating mental illnesses, this proposed chatbot is a human brain
motivated emotional Intelligence.
The Object Detection Smart Delivery box operates on raspberry pi with two cameras, one camera that
takes a picture of the delivery person and sends it to the user so that the user can remotely open the
delivery box with the help of an android application. Another camera which is placed inside the box
scans the package, recognizes it with help of “TensorFlow object detection API” and mails the picture
of the package to the user. Receiver module displays the name of the package and tells what package
is delivered. The user can also use Google assistant voice command to open or close the Object
Detection Smart Delivery box.
The medical question classification is one of the essential steps in building an outstanding ques-tion
answering system for the medical domain. The accurate question classification plays a crucial role in
selecting appropriate documents for answering questions. Due to the competitive nature of deep
learning models in mining deep hidden features, they are popular in accomplishing various NLP tasks.
In this study, we examine the importance of the Temporal CNN (TCN) model in extracting deep
insight features from biomedical questions. A novel deep learning model, Bi-GRU-TCN is proposed
and implemented it for classifying medical question datasets, that blend together the benefits of
BiGRU and TCN. This model not only ex-tract contextual features from the Bi-GRU model, but also
learn spatial features using TCN layers. Comparing our work with the finest deep learning models
with series of experiments, the results show that the proposed model attains an outstanding
performance on biomedical question classification datasets.
Agriculture is the most widely practiced occupation in India. It contributes its major share in the
country’s GDP. Most of the times, agriculturists in India do not get the desired crop yield. This is due
to various reasons like government policies, international market policies, limitations of development
and usages of technologies. These reasons influence the results of lesser economic value of the crop.
The advancement of several engineering techniques provide solutions to combat this problem of
obtaining lesser yield. Data analytics is one among such techniques, which is being used as a part of
meticulousness in agriculture; Data analytics consists of powerful set of machine learning algorithms.
It helps in deriving useful information out of the huge data. These enormous data are collected which
aids in making smart decisions. We can use data analytics in the field of Arecanut crop yield prediction
by analyzing the effect of distinct environmental parameters. Some of these parameters are like
rainfall, temperature, humidity, precipitation, soil quality, etc. During various stages of crop growth,
these analysis provides insight on the crop yield. Such insights obtained can provide suggestions to
the agricultural community. This makes them to think scientifically in the direction of crop cultivation.
The current study uses several data analytical techniques in analyzing the Arecanut crop yield in
various climatic zones of Karnataka state in India. In this study the effect of rainfall, temperature,
humidity and soil type parameters are used to predict the Arecanut crop yield by using Multiple Linear
Regression and Random Forest. The prediction was followed by classification in order to analyze the
yield patterns in different climatic zones. The districts of Karnataka are classified into different
climatic zones by using Random Forest and Fuzzy Logic classification algorithms. In this study,
Random Forest gives good accuracy compared to other techniques for predicting Arecanut crop yield
as well as classification of districts into different climatic zones.
The Autism spectrum disorder (ASD) is a neural developmental disorder that impairs patients'
capability to perform regular activities like social interaction and communication significantly.
Moreover, the procedure of diagnosing ASD is highly time-consuming, labor-intensive, and demands
extensive expertise. Even though there is no such known cure for ASD, physicians have consent
regarding the importance of early intervention for the diagnosis and recovery of ASD patients.
Therefore, for the benefit of autism patients by improving their access to treatments such as early
intervention, we aim to develop a robust machine learning-based system for autism detection using
Natural Language Processing techniques based on information extracted from medical forms of
potential ASD patients. Our detecting framework includes converting semi-structured and
unstructured medical records data into digital formats representation, preprocessing, learning
document representation, and finally performing appropriate clustering so that it could help the
enduser (Physicians)
Pushpalatha M N1, Parkavi A2, Sachin RS3, Amy S Vadakkan4, Aakifha Khateeb5, Deeksha KP6
1 Assistant Professor, Ramaiah Institute of Technology, Department of Information Science and Engineering,
Bangalore, Karnataka
Associate Professor, Ramaiah Institute of Technology, Department of Computer Science and Engineering,
Bangalore, Karnataka
2Student, Ramaiah Institute of Technology, Department of Information Science and Engineering, Bangalore,
Karnataka
3Student, Ramaiah Institute of Technology, Department of Information Science and Engineering, Bangalore,
Karnataka
4Student, Ramaiah Institute of Technology, Department of Information Science and Engineering, Bangalore,
Karnataka
5Student, Ramaiah Institute of Technology, Department of Information Science and Engineering, Bangalore,
KarnatakaAbstract
Human beings commune with each other to convey thoughts, expressions, experiences and so on to
the people around them. But this case is not the same when it comes to the deaf and mute people. Sign
language paves the way for people with such difficulties to communicate with one another. The aim
of this paper is to facilitate easy and accurate communication between people who have hearing and
speaking disabilities, and those who do not. This paper shows how the communication gap can be
bridged using sign language to text and audio converter with the help of Feature Extractor and Posenet
with an accuracy of 92%. A webcam is used to capture the sign language shown by a person. Posenet
with Artificial Neural Network is used to classify essential words used in day to day life. Various parts
of the body are tracked by the webcam and then converted to text and audio to convey what the person
is trying to express in real time.
Horticulture is a branch of agriculture which deals particularly about growing fruits, nuts, vegetables,
flowers and ornamental plants. It is one of the fastest growing economic sectors and 30% of Indian
Gross Domestic Product (GDP) accounts from horticulture alone making India a second largest
horticulture producer in the world. However, Horticulture crops face many challenges like effective
utilization of land, shortage of labour, shortage of water, low soil fertility, early detection and
treatment of plant disease, pest control, crop monitoring, timely harvesting and yield prediction. In
this paper, we present a qualitative survey to address before mentioned challenges in agriculture as
well as horticulture by using technologies like IoT and AI. We discuss about the application of IoT at
various stages of farming starting from irrigation to crop harvesting and also, about the application of
AI techniques for disease detection, yield prediction etc.
Artificial Intelligence provide effective solution to many real time problems and challenges in the
world. Real Time Analysis of rocks and structures is one of such challenges. Many situations require
gaining the knowledge of rocks or building or iceberg structures. Examples where such analysis
required are mining, rescue operations, sailing of ships, etc…. Structure of rocks / debris / icebergs
are got through advanced imaging system and sensors. This paper introduces application of Artificial
Intelligence algorithm for analyzing and predicting the structure of earth or rock.
In this paper, a 243 level Trinary Switched Ladder Multi-level Inverter based on a non-carrier
switching angles algorithm is proposed. The switching angle algorithms generate the triggering angles
for the Digital Pulse Width Modulation signals. The advantage of the non-carries switching angle
algorithm is the precision of the switching signals. The Trinary Switched Ladder Multi-Level Inverter
is a topology that utilizes two wings of DC sources with switch controls for the generation of the
Multi-Level Inverter levels. The 243 –level Trinary Switched Multi-Level Inverter requires 10
switches that split 5 each between the positive wing and negative wing respectively. The 10 switching
patterns are developed using the VHDL code to control the proposed switched ladder Inverter. The
validation of the proposed method is attained by cross-compiling the developed VHDL code in the
MATLAB SIMULINK tool. The parametric analysis namely %THD, Vpeak, Vrms are manipulated
for the proposed 243-level Trinary Switched Ladder Multi-Level Inverter.
Dr.S. Gopinathan
Department of Computer Science,
University of Madras, Chennai-600025.
One of the most frequent diagnoses in neuroradiology is brain tumours. The brain tumours are the
most frequent and most aggressive diseases and their greatest quality of life is quite short. Thus, the
planning of treatments is a vital step in improving patients' quality of life. Improved technology and
machine learning can enhance tumour diagnosis by radiologists without intrusive methods. Nowadays,
Convolutional Neural Networks (CNN) is the most often used algorithm for visual learning and image
recognition. This research seeks to multi-classify brain tumours for early detection by using CNN.
Two distinct CNN models are presented for two classification tasks. The first model of CNN is used
to identify brain tumours with 97.60% accuracy. The other model can classify the brain tumour with
an accuracy of 98% into four tumour kinds such as glioma, normal, meningioma and pituitary. In
addition, the performance of our CNN model was evaluated using 5-fold cross validation technique
and compared with other state-of-the-art models of CNN.
Teachers must be equipped with the skills to integrate technology seamlessly into their teaching in
ways that move beyond mere presentation and communication. It is very important that concrete
preparation program for teachers with appropriate technologies and resources would generate an
effective and creative student engagement and learning. The key challenges and solutions to the
effective implementation and integration of technology in teacher preparation program would widen
the arena of opportunities for students learning. Unless and until teachers implement or impart a new
learning methodology towards the competencies of technology education in colleges and universities,
active learning cannot be achieved. Pre-service teaching is an vital acquaintance in the professional
education program. Although college courses, activities, and practices contribute knowledge and
experience to the prospective teacher, pre-service teaching provides the opportunity to experience the
challenging and gratifying task of assuming major teaching responsibilities. This paper will focus on
how pre-service education would enable the teachers to equip themselves to teach the new generation
ESL learners with ideas and technologies that has become the part of our daily life. Digital pedagogy
permits teachers to develop a plan to successfully amalgamate technology into their curriculum of
teaching that would enable learning through formation, innovation and problem-solving. pre-service
educators can create expert teachers, they plan and prepare programs that would be helpful to
assimilate a combination of skills and knowledge mentioned to as (Technological Pedagogical Content
Knowledge). Pre-service teachers with no doubt be able to subsume a firm comprehension and
knowledge of the content matter, a deep understanding of how students learn, and a practice facility
with technology for learning. The preservice teaching experience is designed to provide a controlled
learning situation in which the prospective teacher can put into practice the principles and methods
learned in the pre-service teacher education Program. The eventual goal of the pre-service teacher is
to achieve competency and proficiency in the entry level skills in the teaching profession.
“There’s no doubt technology can enhance education, but only it is in the hands of well-prepared
teachers.” (AT&T, October 31, 1995)
33. PREDICTION OF REAL TIME SOUND USING MACHINE LEARNING FOR THE
HEARING IMPAIRED PEOPLE
This paper focuses on aiding the hearing impaired people for their development in the society. Most
of the hearing impaired is caused due to the inner ear or nerve damage. Only a few cases can be
resolved using the Hearing Aid. Hence, we have designed a system that could work for all the sound
impaired people regardless of the case they hold. The main reason behind this is that sound plays a
very important role in everyone’s life. It tells us about the environment, the characteristics of it, about
people, place and move in a way where visuals can’t. To make sure that the Hearing Impaired people
are not isolated with the rest of the world we have proposed to design an IoT based Machine Learning
Sound Classification System that captures sound in Real-Time, processes it and then classifies it using
a trained machine. The machine is trained using the Feature Extraction Techniques and the final result
is given as a push notification to the user. Observations made from the results state that this proposed
system can be used in a deaf school or in a place where there are a group of Hearing Impaired people
so that they are also connected to the happenings of the environment.
network architecture consists of a Convolutional neural network and recurrent neural network models.
Evaluation of the model was done on the accuracy of the train and test. The developed algorithm has
achieved the highest average accuracy of 94% on tests. This study helps in the detection of diseases
in clinical settings to assist doctors or health workers in decision-making related to the recognition of
respiratory diseases.
The current state of Digital Identity Systems is fractured among service providers. Users must
duplicate their identity information across services, which reduces overall accessibility and increases
the likelihood of privacy breaches. Users have no knowledge of how their data is being misused by
providers and they have little real influence of it. The concept of Self Sovereign Identity (SSI) has
emerged, promising to usher in a new era in which the individual, and only the individual, has
complete autonomy over their identity records, with clear support for a user - controlled data storage
facility. With the introduction of Blockchain technology, the concept of Self – Sovereign Identity has
gained traction, and it is expected to have a significant impact on how internet users communicate in
the future. This paper primarily focuses on several existing Identity Management Systems and shows
how Self Sovereign Identity is better in many aspects when compared to them.
Owing to the Covid-19 pandemic, online examinations have been widely conducted across the globe
by educational institutions. Such examinations are proctored manually in many cases. But, eproctoring
tools are also available. Such tools employ Artificial Intelligence, soft biometric traits, emotion
analysis, etc., for monitoring the candidates. There are certain limitations with the use of these e-
proctoring tools. These loopholes permit the candidates taking up the examination to indulge in
impersonation or malpractice of any kind. There are several aspects to be considered during online
exam conduction including authentication, security and evaluation. In this paper, a survey is conducted
on online examination conduction techniques. A comparative study on the advantages, limitations and
scope of such techniques has been discussed in detail.
Dr. T. Anithab, Associate Professor, Department of Electronics and Instrumentation Engineering, Annamalai
University, Chidambaram, Tamil Nadu, India.
Dr. M.Arulaalanc, Professor, Department of Electronics and Communication Engineering, CK College of
Engineering and Technology, Cuddalore, Tamil Nadu, India
The Quantum Dot Cellular Automata (QCA) is a novel technique in Nano-Electronics based digital
design. The QCA is the best alternate for the CMOS design for its less area occupancy, high
performance and low power consumption. This brief presents the Quantum dot Cellular Automata
design for the fusion Digital Pulse Width Modulation. The proposed fusion Digital Pulse Width
Modulation includes the counter and comparator circuits for the Counter based Digital Pulse Width
Modulation, the ring counter and multiplexer circuits for the Delayline based Digital Pulse Width
Modulation and the combination of CDPWM and DDWPM for the Hybrid based Digital Pulse Width
Modulation. In this work, the resolution is fixed at 23 bits for CDPWM, 22 bits for the DDPWM and
25 for HDPWM. The QCA based fusion Digital Pulse Width Modulation is designed and evaluated
using the QCADesigner Tool. The parametric analysis of the proposed QCA based Fusion DPWM is
compared with the CMOS based design.
COVID-19 pandemic is a severe health disaster affecting multiple countries. Widespread breakouts
have been linked to negative psychological health repercussions. COVID has brought many changes
in the way human beings think and act. Most of the people in the country suffer due to physical health
and mental health issues. It has affected all the age groups and all the sectors. Schools and colleges
have been affected and led to shutting down. Human resources those who are working in the service
sector facing challenges. Due to the mode of work where face-to-face interaction is needed. Employee-
customer contact is the most critical aspect for success in the service industry. Organizations in the
service sector exert ongoing pressure on their staff to perform since front-line employees are
frequently the first point of contact for customers; thus, they must be active, thorough, analytical, and
pleasant. Service organizations like Insurance companies play a significant role in building up a
nation. It contributes in terms of creating huge employment opportunities. This sector has undergone
a lot of changes after globalization. Sales department employees go through a lot of ups and downs
due to heavy targets on them. These Employees in the Insurance sector are under extreme time
pressure to complete tasks. As a result, employees are under much stress and have many emotional
problems. Performance is influenced directly or indirectly. Employees are expected to deliver
exceptional results. Employees must be notable performers to provide these outstanding results in their
job more than usual, resulting in excellent productivity. So, Investigator has attempted to find out the
level of emotional intelligence among the sales department employees of the Insurance sector and
offer suggestions to enhance EI among employees. Data was collected from 612 employees of the
private insurance sector through a structured questionnaire. Data was analyzed using descriptive
statistics-test, ANOVA, and cluster analysis.
In this article, we define a new soft open (closed) set called infra soft α-open (closed) set and establish
some fundamental properties of this soft open (closed) set. The relation between infra soft αopen
(closed) set and other topological sets are studied. The findings mentioned in this study are preliminary
and serve as an introduction to more advanced research in theoretical and practical areas. AMS
Subject Classifications: 54A40, 54C08, 54C10
The agriculture plays a very crucial role within the overall development of the country’s economy.
Climate change, irregular rainfall, change in the nutritional content of the soil and some other
environmental changes have been considered as a serious issue within the agriculture. Using deep
learning models which takes on the various parameters can be considered as an important approach
for achieving an accurate and effective solutions for this drawback. Prediction of the crop yield can
be done by using the yield data of the crop which can be obtain from a historical source which should
have the information like weather, soil nutrient content, soil type, season in which the crop was grown
and its yield. A large dataset containing various parameters would be required in order to train the
model and attain a good accuracy. This paper targets on predicting the yield of a particular crop which
will be supported by the present information using LSTM time series analysis. The information that
is used for building the models was taken from a reliable source thus containing the accurate values.
Also, a lot of models were tested with sample dataset. The prediction of the yield using the advanced
methods can help the farmers to forecast the yield of a particular crop even before cultivating the crop
sown on a piece of agricultural land.
Venkatasubramanian S
Computer Science and Engineering
Saranathan college of Engineering
Trichy, India
Suhasini A S
Computer Science and Engineering
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
20 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
Annamalai University
Chidambaram, India
Vennila C
Electronics and Communication Engineering
Saranathan college of Engineering
Trichy, India
Gomathi K
Computer Science and Engineering
Saranathan college of Engineering
Trichy, India
Mobile Ad hoc Networks (MANETs) are overburdened with stagnant traffic. As a result, the routing
protocol for energy-efficient with load balancing has become an urgent need for MANET, especially
given the limited battery resources in the nodes. Most of the existing routing protocols are
timeconsuming because they consider power at the expense of time and over-routing. An energy-
saving, meta-inference-based load balancing protocol is an alternative model that is more challenging
than traditional routing schemes. Therefore, in this research activity, a meta-inference-based Bald
Eagle Search (BES) approach is developed for an optimal routing protocol for balancing the load in
energy usage. There are three major steps used in the BES, while hunting the fish. Initially, the location
of the vast number of prey is selected by an eagle in the space selection stage; the searching process
of prey is carried out by moving into the selected space during the space search stage. Finally, during
the dive stage, the best point is identified for hunting by swings from the best position that are
determined in the second stage. Therefore, the optimal path is identified by the proposed BES, while
considering the parameters of energy, bandwidth, delay, reliability, and quality. Finally, the proposed
algorithm supports Quality of Services (QoS) and finds the shortest path from one source to the
destination with the lowest power consumption. When analyzing the results based on simulation, the
proposed BES scheme showed a significant improvement in better battery life, less energy
consumption, and high throughput.
Vehicular conversation networks is a effective device that permits several vehicular information
offerings and programs. The fast boom in automobiles has additionally resulted withinside the
vehicular community turning into heterogeneous, dynamic, and large-scale, making it difficult to
satisfy the stern requirements, along with extraordinarily latency, excessive mobility, pinnacle safety,
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
21 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
and sizable connections of the fifth-era community. Previous research have proven that with the
growth withinside the utility of Software-Defined Networking (SDN) on Vehicular Ad-hoc Network
(VANET) in industries, researchers have exerted widespread efforts to enhance vehicular
communications. This observe offers an exhaustive overview of preceding works with the aid of using
classifying them primarily based totally on primarily based totally on wi-fi conversation, mainly
VANET. First, a concise precis of the VANET shape and SDN controller with layers and information
in their infrastructure is provided. Second, an outline of SDN-VANET programs in distinctive wi-fi
communications, along with the Internet of Things (IoT) and VANET is supplied with attention at the
exam and contrast of SDNVANET works on numerous parameters. This paper additionally highlights
the present day and rising technology with use instances in vehicular networks to deal with the
numerous demanding situations withinside the VANET infrastructure. This survey acts as a catalyst
in elevating the emergent robustness routing protocol, latency, connectivity and safety problems of
destiny SDN-VANET architectures.
R.Lilly1 S.Prabhakaran2
1Assistant professor, Department of Naval Architecture and Offshore Engineering, Academy of Maritime
Education and Training (AMET), Chennai, India.
2Professor, Department of Marine Engineering, Academy of Maritime Education and Training (AMET),
Chennai, India.
Salt damage affects the life of the structure significantly. Huge Constructions with higher investments
needs larger life. The Underground metro rail corridor of Chennai constructed along sea coast was
taken as study area which had a greater chance of affected with salts. As a protective measure from
the salt damage, Carbon Nano Tube the Nano material was tested as wrapping material and its
effectiveness in reducing the salt contaminants was found in the laboratory. The sample points are
located on either side of the corridor and sampling was done .The salinity of the water was examined
in the laboratory for the sample points and the water was allowed to pass through the Carbon Nano
Tube. The passed through water was tested again for the salinity levels. Significant reduction of the
salt contaminants was observed during this laboratory investigation. The salinity was identified as a
measure of Electrical Conductivity. Cost of the Nano materials are highly reduced in recent years.
Hence the Nano material founds to be a highly effective solution for the future planet fresh water.
The renewable energy sources plays a major role in village electrification. PV fed standalone micro
grid suits well for village electrification as grid connected micro grid needs extension of infrastructure
and takes nearly a year to reach the villages. This paper focuses on designing a non-isolated two phase
interleaved boost converter(NI-TPIBC) with Voltage Multiplier Module (VMM) which acts as an
intermediate and promising candidate that connects PV source to the DC load or DC bus. Since PV is
intermittent in nature and produces low voltage, the proposed converter is designed to achieve high
voltage gain with moderate duty cycle. The proposed converter is built to cut down the voltage stress
of the switches and diodes. The leakage energy of the coupled inductor is recycled and the clamp
circuit reduces voltage spikes of the power devices during turn off operation. Further PID controller
and Fuzzy Logic Controller are also used to supply regulated DC bus voltage during different
irradiance level of photovoltaic array and different load variation conditions. The transient response
parameters such as settling time, peak overshoot of the converter is compared for both the controller
and FLC which gives better results.
Nowadays, the high strength concrete is develop using nano- materials incorporated by cement. The
nano - materials fill the voids or porous in concrete so that strength and durability are easily has been
achieved. In this paper, the nano-SiO2 materials are partially incorporated into cement and enhance
the strength. The various percentages of nano - SiO2 materials partially incorporated such as 1%, 2%,
3%, 4% and 5% . In this paper, briefly introduced the influence of nano-SiO2 on mechanical and
durability performance of concrete. In addition, this review also includes the micro structure measured
by scanning electron microscope (SEM). The results show that the enhanced compressive strength
and durability of concrete has been achieved, when nano - SiO2 incorporated up to 2% by cement.
The nano - material increased above 2 %, the strength and durability of concrete also reduced. Whan
up to 2 % nano - SiO2 incorporate with cement, the 28 days compressive and tensile strength has been
increased, and also durability performance also good.
Online social networks provide an arena for people to share their views and perspectives on different
issues and subjects with their friends, family, relatives, etc. It is planned to detect and analyze
sentiment and emotion expressed by people from text in their twitter posts and use them for generating
recommendations. The tweets are collected on a few specific topics and created a data set which is
used to detect sentiment and emotion from them and measure the influence scores of users based on
various user-based parameters. Then the latter information is used to generate generalized and
personalized recommendations for users based on their twitter activity. These recommendations have
a list of users who agreed on the same topic and expressed similar emotions and sentiments towards
that particular topic. Among the three supervised classifiers experimented, SVM provides the best
results for the full text by considering sentiments and emotions.
We present algorithms in this article and demonstrate the existence of Group{1,-1,i,-i} Cordial
Labeling in the extended duplicate graphs of complete bipartite, quadrilateral snake, alternate
quadrilateral snake and duplicate graph of complete graph with even vertices, triangular snake,
alternate triangular snake .
C.Bhuvaneswari
Department of EEE
Sathyabama Institute of Science and
Technology
Chennai ,India
M.Kavitha
Department of EEE
Sathyabama Institute of Science and
Technology
Chennai ,India
W.Abitha Memala
Department of EEE
Sathyabama Institute of Science and
Technology
Chennai ,India
V.Vijeya kaveri
Department of CSE
Sri Krishna college of Engineering and
Technology
Coimbatore- INDIA
D.Godwin Immanuel
Department of EEE
Sathyabama Institute of Science and
Technology
Chennai ,India
Among the non-conventional energy sources, it is much beneficiary and mandate to utilize wind
energy for the development of decentralized integrated energy systems in conjunction with solar
energy, hydel energy and biomass etc., Wind turbines do not launch emission which can pollute air or
water and water is not at all needed for the cooling system used in it. The quantity of carbon dioxide
emissions, amount of green-house gases is remarkably reduced. Wind power is suggested for a
prolonged usage while problems like oil shortages and environmental effects etc., arises in the power
market. In view of small scale energy manufacturing system, Permanent Magnet Synchronous
Generator (PMSG) is appropriate considering its cost and simple operation, while for large scale,
Doubly Fed Induction Generator (DFIG) is preferred . In this paper the filter design along with its
mathematical expressions to validate the design details both in analytical and experimental manner is
discussed. The transfer function of LCL filter in grid side is found out and the consequent frequency
domain approach using Bode plot has been presented. The total harmonic distortion with reduced
ripple component is observed in the grid current for LCL filter and design parameter for LCL filter is
done.
The aim of the research project is to resist the seismic force/ vibration force in railway steel truss
bridges using splice connection. Using the Warren type of railway truss bridges Analysis and designed
by Indian standard railway code (IRC) and IS 800 -2007. The connection of the railway truss bridge
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
25 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
is bolted with splice connection. Same cross sectional area has been carried for both theoretical and
experimental investigation. Observed from the results, the splice connection has high load carrying
capacity, low deflection and high level seismic resistance.
Progression of a distinct behavioral examination is studied using continued process. Continued process
is mostly multidimensional array to previous terms using recursion, in this continued process with the
nth term is straight line. Among them, in a sequence or a multidimensional array to previous terms
using recursion with constant coefficients and linear recurrences with polynomial coefficients are very
much important. Continued process results are generally straight-line recurrences, in this nth term
would be straight line regarding to its previous terms. Objective of this paper is finding the fraction of
f term to term and it’s known as mean ratio. Continued process is applied step-by-step for a common
sequence to determining a précised iterative relation and mean ratio. By characterizing graphs, we can
easily understand exact results obtained which is nearest to 2 on either side of progression. Closest
point of progression when, m=18 the result obtained is 1.9999 and then when, m=19 the result obtained
is 2.0001.
This paper converses instigating UAVs for several civilian and armed zones by generating FANETs
as modern solicitations comprise slightly floating nodes. Flexible, consistent, and delay-bounded
infrastructures among UAVs are essential in FANETs due to the quickly altering topology and
augmented quantity of UAVs by continuing the anticipated system with eminence facilities. Data
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
26 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
transmitting between UAVs is a key challenge in FANET, because FANET is not similar to the
MANETs with the limitations of less convenience and high mobility. The dynamic updating of routing
tables should achieve as indicated by topology changes. To afford a reliable communication between
UAVs, metric controls have not measured by maximum number of current routing procedures in
FANET. Due to the sophisticated movement of FANETs, the actual challenge is the routes
consistency. In this research work, we have introduced a new routing system, a predicted future
weight-based routing scheme for FANETs that considers the node's present and upcoming values of
detailed parameters for the reliable routing. This proposed routing procedure allocates weight to every
node in the network by calculating the node's future. Depending on this process, the connecting nodes
can found a reliable path that continues for a long time. This dynamic future prediction-based routing
scheme ensures better data delivery with minimum overhead and optimized energy consumption in
all conditions than traditional routing protocols. The proposed routing protocol could achieve better
results than other routing protocols based on the valuation of simulation results.
Squash is a non-alcoholic beverage that has 7g of fiber, 89% saturated fat, 150 ml of coconut sprout
extract, and 150 ml of tender coconut water it also includes two ml of ginger, 2ml of lemon, and 0.1
ml of sodium benzoate. Before serving, it is diluted. Coconut sprout squash is indeed a naturally
highenergy drink that is quite nutritious. Coconuts are still one of the world's most significant crops,
they are grown in tropical countries like India. Tender coconut is a plentiful and naturally occurring
resource that is utilized as a meal and beverage. The goal of this study was to construct a squash with
coconut sprout extract, tender coconut water, lemon juice, and ginger juice. To determine the most
appropriate boiling methodology for generating coconut sprout squash and to assess the overall
acceptability of squash in prepared sample A. In comparison to sweet orange squash, sample A had
the highest squash score. In comparison to sweet orange squash. Sample A had the greatest protein
and carbohydrate score. The sample had the highest overall acceptance. The prepared sample is placed
in a glass bottle and air-cooled separately on wooden planks. In physicochemical and sensory
evaluation, sample A was preferable. The samples are tested for proximity and microbiological
contamination. The formulated coconut sprout squash contains a significant level of Omega 3 fatty
acid, making it ideal for people with colorectal cancer and high blood pressure.
This proposed work uses Complementary Split Ring Resonator (CSRR) to filter out the frequency
bands. It is evident that any planar antenna will radiate in its resonant frequency as well as other
frequencies. Those harmonics need to be eliminated from the radiation characteristics to have effective
radiation. This filter is designed for 2.5GHz to remove those undesirable harmonics and hence a band
elimination filter is approached using square and hexagonal ring configuration.
This research work focuses on the design and development of the wireless charging system for electric
vehicles. The research components of the work include the design of a compensation circuit and
coupling coil geometrical analysis for maximizing the power transfer efficiency. The preliminary
work on the compensation circuit, involved the design of LCCC-LCC, unbalanced series-series
topology. The parameters of the circuit components are optimized under simulation environment and
it is experimentally validated with the real-time implementation of the proposed circuit. The coupling
coil used in the wireless charging system has a prevalent impact on the efficiency of power transfer.
The work spans across the three different geometrical designs of circular coils and analysis of the
same under the developed experimental design. The analysis of the proposed system is extended
towards the understanding of varied coupling factor and coil dimensions. The outcome of the analysis
attains an optimized wireless charging system with improved efficiency and reduced design
complications
Techniques for designing an Electric Vehicle Hybrid Energy Storage System are being considered.
As a result of the increased demand for electricity, there must be greater monitoring and more
frequent regulation, and there must be more difficulties overcome in the creation and refining of
specialised techniques to meet it. Projects to reduce energy consumption in the construction,
transportation, commerce, and other activities are examples of such initiatives. Computer and
smartphone-based entertainment, basically portable PCs, is becoming more popular. This difference
must be made between the capacity to store energy utilising renewable resources for lengthy periods
of time and the technology for minimising energy use. A great amount of study and investigation is
required as a consequence of the nature and scope of this subject matter. An in-depth grasp of the
significance of electric automobiles for hybrid energy storage systems would be incorporated in a
more focused comprehension of their respective points of view. PI and neural networks are
employed in this thesis to create improved distortion-free outputs using a unique technique based on
neural networks and PI.
Background: Rechargeable batteries have become a key renewable energy source for various
applications such as transport, grid storage and mobile systems in recent years. Much more powerful
batteries and the introduction of electric cars with a greater performance than fossil fuel cars were
accomplished by the advancement of power storage technology. Despite of the relative maturity of
batteries, the academic industry and businesses are working hard to make vehicle electrification
batteries safe and affordable. Methods: A battery test commonly used for charge and discharge
constant voltage, Current and constant exile electric mode, record the process of testing data, such as
testing time, voltage and current. The electrochemical performance parameters characterization of
material capacity, columbic efficiency, charging and discharging platform and battery internal
parameters. The battery management system (BMS) is a critical component of electric and hybrid
electric vehicles. Findings: The purpose of the BMS is to guarantee safe and reliable battery operation.
It is used to improve the battery performance with proper safety measures within a system. Therefore,
a best BMS is that must need for operating an electrical system. Novelty: This paper reviews the
characteristic of battery management system and its technology with advantages and disadvantages.
Also, aims to analyzing this battery management system in detail
Keyword: Battery, Battery Management System, energy storage safety, electric vehicle.
The main aim of this research is to examine the consumer perception towards online food business
apps and to analyze the perception towards quality of apps and websites of electronic food ordering
companies among the respondents in Karur district .Both primary and secondary data has been used
to collect the information. Technology Acceptance Model questionnaire model has been used to
collect the data. Sample Size is 120.Kruskal Wallis test has been used to find the relationship between
variables.
In present era, social media is been evolving widely in terms of using for connecting to their friends
and beloved one’s, posting and sharing the information. Few social Medias like, Face book, LinkedIn,
twitter was also using for sharing the ongoing daily trends in the real world. In metro cities like
Bangalore, Chennai, Delhi Mumbai and Hyderabad are well known to their traffics, people are
struggling to reach their destination on time. In our paper, we were focusing on detecting the traffic
information from social media text to make sure traveler reach their destination or places with a short
time or quick. Also, we were focused to provide the necessary safely precaution on the road accident
on their go. The main advantage is to increase the accuracy of traffic event and to display the location
information of huge traffic. In this paper, we used the Logistic Regression method is used to extract
the real-time traffic information which is also compared with combination of CNN-LSTM Method.
Sentiment analysis (SA) and sarcasm detection on social networking platforms have gained significant
attention in recent times. The existence of sarcasm in social networking data like Twitter is a major
cause of wrong categorization of sentiments. It remains a challenging issue in natural language
processing (NLP) as it restricts the way of identifying the original sentiment of the people. Different
feature engineering approaches are available in the literature to detect the presence of sarcasm in
Twitter data. This study develops an Optimal Bidirectional Long Short Term Memory based Sarcasm
Detection and Classification (OBiLSTM-SDC) using Twitter Data. The goal of the OBiLSTM-SDC
technique is to identify and classify the existence of sarcasm in social networking data. The
OBiLSTM-SDC technique involves term frequency-inverse document frequency (TF-IDF) model for
feature vector generation. In addition, the BiLSTM model is employed for the classification of sarcasm
and the hyperparameter tuning of the BiLSTM model takes place by the use of chicken swarm
optimization (CSO) algorithm. The performance validation of the OBiLSTM-SDC technique takes
place on benchmark dataset and the results are inspected under various aspects. The simulation results
highlighted the supremacy of the OBiLSTM-SDC technique over the recent approaches.
Often, small clinics and hospitals using previous generation of Medical equipment do not have facility
to transfer patient data to a remote location for analysis. As the ratio of doctors to patients is declining
due to rise in health care issues, it is necessary to monitor patient data from a remote location, where
qualified medical professionals are available. India counts to 1,85,505 Primary Health Centres in rural
villages alone with approximately 371 crore worth medical equipment. Due to the cost ratio, the entire
equipment replacement with modern technology would be myth. Rather, implementation of add-on
equipment with the existing equipment will help provoke of a decision support system for telehealth
enhancement. The proposed work includes a clip on camera supported with IoT to capture the screen
continuously and transfer the data wirelessly to remote location. This will be a small add-on camera
to every equipment. It is a portable, small clip on device which can be added to any biomedical
equipment by clipping on it to the display monitors. The work proposes a system that consists of a
camera that can be clipped onto the screen of the existing equipment and a data processing module
and a data transmission module. The receiving end will be a wireless receiver module and a translator
and display capable of receiving from multiple equipment. The development of camera based medical
equipment is very helpful in the hospitals located in the rural areas. It includes data extraction, data
storage and data visualization. This works under the basis of Optical Character Recognition and
Application Programming Interface in Google Cloud Platform. This proposed work would be useful
for patients in need of diagnosis and treatment who are remote from the doctors and using the existing
older generation biomedical equipment itself.
. The recent advancements in small wind turbines show an increased demand for the Darrieus wind
turbine in the urban environment. The present work is devoted to the numerical analysis of the
aeroacoustic sound emission from a straight bladed Darrieus wind turbine with NACA0018.
Computations are performed at Reynolds number of 28,000 with a tip speed ratio of 0.4 using the
unsteady Reynolds averaged Navier Stokes equations with Ffowcs Williams- Hawking's (FW-H)
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
31 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
acoustic analogy. The FW-H method is based on a free field Green's function where the scheme uses
a porous integration surface and implements an advanced time formulation. The study aims to obtain
a numerical methodology to predict the effect of surface roughness on wind turbines' aerodynamic
power and sound emission.
62. PCOD PREDICT FOR OBESE PATIENT USING NAFLD AND T2D PROFILES
H.Kala, K.Sharmila, A.T.Priyeshkumar
Dept.of Biomedical Engineering
Mahendra College of Engineering
Salem, India
PCOD is the major problem faced by women in now-a days which is caused by increasing the male
androgen level and cause heavy bleeding, infertility and cause severe effects like diabetes also.. For
that an indigenous device has been designed for detection of Polycystic ovarian disease based on
measurement of the volatiles in the Exhaled Breath. This device useful in clinical field. The sensing
unit is based on the two commercial sensors of MQ136-Hydrogen sulphide and MQ3-Alcohol sensor
which are sense the VOCs of Hydrogen sulphide and Ethanol contained in the human Exhaled Breath.
The patient samples of Exhaled breath to be blowing through inhalation tube, a mouthpiece is to be
linked with patient mouth for blowing. We have designed and tested this device with two different
types of patients between obese patient with PCOD and Lean patient without PCOD. This device can
differentiate the with PCOD and without PCOD patients for predicting the PCOD patient correctly by
analyzing the VOCs of NAFLD and T2D because the NAFLD and T2D are the major influences for
getting PCOD, particularly in obese patient. With further developments and measurements gives the
hope which this system will become as useful device in clinical purpose for screening the PCOD
problem at easiest way, in Non-invasive method than invasive method in future. Such that this device
will be reduce the usage of invasive method, patient discomfortness and cost.
Network safety is a procedure utilized to ensure the client’s classified Intel and shield from online
cheats and frauds. Network protection gives a safe space for the clients to get to their Intel safely. In
this paper, the author breaks down bunches of escape clauses that threaten digital protection,
prompting network assaults. This paper additionally discusses distinctive organization security
methods. The network safety strikethrough has sought me to explore this space. The information and
secret data of different organizations are in grave danger, so this exploration is an endeavour to give
a rampart with the goal that no intruder can encroach and strikethrough data. It is an endeavour to plug
all escape clauses to give a superior and dependable organization. While more businesses suffer severe
security breaches, the amount of data that has been exposed is increasing. According to data breach
stats, hackers are motivated by money to obtain data, and private information is valuable to infiltrate.
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
32 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
It’s also clear that businesses are still unprepared even though data breaches are becoming more
regular. In today’s environment, network security flaws are the most frequent dangers and difficulties.
The justification for this is that everything and everyone is connected to the Internet. That implies
there’s a chance the technology may be hacked, but there’s also a chance it won’t. There are some
manufacturing deficiencies, and sometimes, while designing a product, the developer is left with a
loophole or backdoor in the product; the product can be anything; for illustration, when an ISO image
is configured in hardware, there is a possibility that certain backdoors and loopholes stay, which may
impact clients or associations in the long term. There are numerous methods for this sort of incident,
and when we implement specific strategies. Some of the strategies provided by the author in this paper
demonstrate how to discover issues and implement specific techniques to make their network more
secure and robust.
This paper examines firewall mechanisms routinely implemented for network security in depth. A
firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds
of infrastructure are employed to establish a secure network. Firewall strategies have already been the
subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by
combining capability of the firewall of the use of additional firewall mechanisms which including
packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall
potential and combined approaches, but there aren't many. The research team's goal is to build a safe
network by integrating firewall strength and firewall methods. The study's findings indicate that the
recommended concept can form a reliable network. This study examines the characteristics of network
security and the primary danger, synthesises existing domestic and foreign firewall technologies, and
discusses the theories, benefits, and disadvantages of different firewalls. Through a synthesis and
comparison of various techniques, as well as an in-depth examination of the primary factors that affect
firewall effectiveness, this study investigated firewall technology's current application in computer
network security, then introduced a new technique named "tight coupling firewall." Eventually, the
article discusses the current state of firewall technology as well as the direction in which it is
developing.
Due to the lack of user-to-cloud controllability, people endorse the benefits of cloud computing, but
are hesitant to trust cloud providers with private information. Owners of data outsource encrypted data
rather than plaintext in order to ensure confidentiality. CP-ABE (cypher text-policy attribute-based
encryption) can be used to conduct fine-grained and user-centric access control when sharing
encrypted data with others. However, this isn't sufficiently secure from other attacks. Previous
schemes did not allow cloud providers to verify whether a downloader could decrypt data. As a result,
all users should have access to the files. To launch economic denial of service (EDoS) attacks,
malicious attackers can download thousands of files, consuming much of the cloud's resources. Users
pay for these resources. A cloud provider is both an accountant and a payee for resource consumption,
which leaves data owners in the dark. These concerns must be supervised in cloud applications in the
real world. The project proposed a method for securing encrypted cloud storage from EDoS attacks
and providing resource usage reporting. By using CP-ABE schemes in a black-box manner, it
complies with the arbitrary access policy of the CP-ABE. Two protocols are presented for different
settings, and performance and security analyses are presented.
The communication industry involves in all the digital environment in the world, the Ultra-wide band
Microstrip patch antenna plays a vital role, because the patch antenna consists of compact size, less
weight, better return loss and good radiation pattern. The proposed U-slot ultra-wide band antenna
was designed for wireless sensor applications and it operates in triple band frequencies of spectrum
sensing function for three different applications. The antenna is designed using the FR4 substrate
material with reference to the ground plane, the U-slot is etched from the rectangular patch to get the
good wireless sensing, triple frequency band operation for spectrum sensing and it gives the good
return loss i.e., below 10dB in negative, gives the Omni directional radiation pattern in the ultra-wide
band range 3.1GHz to 10.6GHz also to achieve a good gain, hence the ultra-wide band antenna is
suitable for triple band application like cognitive radio, satellite, radio navigation etc.,
The idea is to create a service that enables users to communicate with other users using a Mesh
Network established between their devices. The Mesh network is to be built using the Bluetooth
service available in the user devices. There are apps built using this technology such as Bridgefy,
Mesh Messaging, Fire chat, etc. But the proposed application enables users to send messages to other
users through the Bluetooth network established between the user devices. The application does not
require any Internet connection. The idea is to transfer data from the sender to the receiver where it
finds its way using a Dynamic routing algorithm. The middle devices (user devices that are not
participating in the communication) act as routers in the network. The app encrypts the messages
which are sent from the sender so that the middle devices cannot see them.
Aluminum matrix hybrid composites reveal excellent mechanical behavior compared to traditional
materials for a wide range of conditions and applications. However, the machining of this kind of
composites is a challenging job due to its improved mechanical hardness. The problems faced during
cutting of these composites increased machining forces, poor surface quality, and increased tool wear.
Many types of research are still in progress across the world to overcome these issues by using a
variety of inserts and processing constraints. So, this paper is mainly focused on the study of the
machinability of aluminum hybrid composites. The composites are synthesized by employing stir
casting via varying the filler content, stirring duration, and speed. The fabricated composites are
machined using coated and uncoated carbide inserts. Machining forces, surface roughness, and insert
wear are assessed to learn the machinability of these materials by varying the machining constraints.
Taguchi analysis was employed to assess the effect of the constraints on the retorts.
1,2,3 Department of Mechanical Engineering, SRM Institute of Science and Technology, Kattankulathur,
Chennai, India, 603203
Magnesium-based materials are in superior demand in auto industries due to their improved properties
and behavior. However, processing and further post-treatment of this kind of magnesium composites
is a stimulating chore because of its characteristics. In particular, heat treatment of this kind of
magnesium composites may induce a change in grain structure which in turn alters the properties
according to the need. So, this article is chiefly focused on the fabrication of magnesium composites
by filling with SiC and graphite. According to the Taguchi array, the composites were developed by
altering the filler content, stirring duration, and speed. Four samples were fabricated accordingly by
employing the stir casting technique. The fabricated composites were exposed to different types of
heat treatment processes such as annealing, normalizing, tempering, and quenching to learn the upshot
of the same on its behavior. The morphology of the dispersions of the developed composites was
analyzed using an optical microscope, the mechanical and physical behavior like hardness, density,
wear, and tensile tests were performed on the developed samples. The morphology and behavior of
the fabricated composites were compared and analyzed pre and post-heat treatment.
Diana Hyden N
Dhanya K
EEE (UG)
National Engineering College
Kovilpatti
Samuel Pakianathan P
Muthuselvi G
EEE (UG)
National Engineering College
Kovilpatti
Transformer oil is mostly used to keep the transformer cool. It functions as a cooling agent. Mineral
oil has long been used in transformers. Mineral oil has a high dielectric strength, which allows it to
withstand high temperatures. Mineral oil's main disadvantage is that it is not environmentally friendly
and can be dangerous to the environment. The features of breakdown voltage (BDV), viscosity, flash
point, and fire point are measured and reported in this study, and the characteristics of olive oil are
compared to the characteristics of mineral oil.
SCSVMV
This study motivates the farmer to utilize an e-commerce platform to shape their revenue. Ecommerce
is one of the fast-moving industries in the world. Many businesses were already shifted to e-commerce
and generating huge revenue within a short period of time. The major problem is "The farmer who
produces food for the nation is not benefitting with the income". Because there is no such dedicated
platform for farmers to generate profitable income for their cultivated products. Existing platforms are
combined with all categories (home, kitchen & electrical appliances) of products that might muddle
up farmers, and also the lack of internet knowledge is one of the reasons that a farmer may not be able
to sell their products online. To overcome this, The online multivendor platform will be helpful where
a farmer can able to sell or purchase anything related to the agriculture & farming category. A simple
user-friendly web page with multiple farmer vendors and multiple agricultural products along with
detailed studies (blogs) about the latest farming technologies, will surely shape the farming sector
revenue. This will benefit farmers to get internet knowledge and save both time and energy. Also, new
connections & communications will be established and the product stock will sell easily without any
labor help. In a nutshell, It is a dedicated multivendor platform for farmers with all farming products
like pesticides, seeds, fertilizers, crops, etc along with a knowledge base. So, this initiative will surely
play a vital role in uplifting & benefitting framers.
Dr.A.Pethalakshmi
Principal,
Alagappa Government Arts College,
Karaikudi
Reinforcement Learning is a combination of supervised learning and unsupervised learning, the two
main streams of Machine Learning and has many applications in Artificial Intelligence arena.
Reinforcement learning algorithms range from Q learning algorithms to Deep Q Network.
This research article analyses the elements of Reinforcement learning, discusses basics of Q
Learning algorithm ,with a simple implementation and concludes with the findings .
E-Commerce is the platform that merchant publish their products and makes online marketing process
online by using web browsers. Now days this online marketing is growing quickly and demand for it
is high. To purchase these products from the merchants, user needs to do an online transaction. Most
Internet payment gateways in e-commerce provide financial information to customers using believed
third parties directly to a payment gateway. Either the payment gateways follow the strict policies and
its there might be a chance of fraud that allows stealing the monetary information of users. So, this
project main role is to provide an effective and secured electronic payment gateway where users can
connect immediately to the merchants directly. In this proposed system the user would do the
transaction under a secret key that is generated by using encrypted algorithms, and the details of user
will be in secured mode. So, we can say that our protocol has much improved security analysis that
user can do their transactions without any doubt. Any payment gateway should have some entities are
confidentiality, integrity, non-repudiation, anonymity availability, authentication, and authorization.
We can say that these would give trust to the customers that their information will be in safe and
secured. And the proposed system of this project has these entities and maintains the customer details
or information secured.
1, 2 Assistant Professor, Dept. of CSE, SCSVMV (Deemed to be University), Kancheepuram, TamilNadu, India
Social Media Services are emerging communication mediums for people to establish and manage
social relationships. On social media websites, consistently, billions of users are engaged in social
interaction, content and opinion dissemination, networking, recommendations, advertising, scouting,
alerting, and social campaigns. The hype of social media services open-up a new opinions and hurdles
to the study of social media networks, being of interest to many fields. Social media is a place where
social activities, business-oriented activities, entertainment, and information are traded. It inaugurated
a worldwide connectivity environment where communities of people share their interests, ideas,
talents and activities, or who are interested in interests and activities of others Although social network
has given enormous benefits to the people at the same time harming people with various devious
activities that take place on social platforms. This causes notable economic losses to our society and
even endangers national security. Platforms like Facebook, Twitter, LinkedIn, etc. are highly receptive
to malware activities. Twitter is one of the biggest microblogging networking platforms; it has more
than half a billion tweets posted every day on average by millions of users on Twitter. Such
adaptability and wide usage of Twitter and other social media networks makes it the target. They can
be easily invaded with poisonous activities such as malware intrusion, spam distribution, social
attacks, data breaches etc. Ad mailer/Spammers use social planning attack strategy to send junk tweets,
spam URLs, etc. This made twitter an exemplary field for the expansion of unidentified spam
accounts. The impact stimulates researchers to prepare a model that analyses, detects and recovers
from scandalous actions on Twitter. Twitter’s system is besieged with tens of millions of fake spam
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
38 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
profiles which may cause trouble for the normal user's security and privacy. To improve real customer
safety and recognition of spam profiles became key parts of the research.
1, 2 Assistant Professor, Dept. of CSE, SCSVMV (Deemed to be University), Kancheepuram, TamilNadu, India
The user will be given a set of hardware with pre-installed software which needs to be placed at the
entrance the hardware will detect whether the person entering the premises is wearing a mask or not
and the body temperature using no contact temperature sensors after those two things have been
checked if the person’s body temp. is normal and he/she is wearing a mask than the gate will open or
vice versa automatic Room light and fan controls are mostly implemented in theatres, shopping malls.
But this is the case where we can control the lights and fans of the room as well as we can also count
how many persons are entering into the room and also shows how many are exiting the room. here in
this we have used the Arduino UNO board, IR sensors and LCD display screen.
Regular vehicle servicing helps vehicle owners prevent unexpected vehicular malfunctions.
Identifying vehicle problems at an early stage is essential before they’ll turn into significant issues.
Vehicle owners tend to visit vehicle garages to enquire about vehicle servicing. Vehicle mechanics
check the vehicle’s vital components and repair issues to ensure that they are in good shape and will
not fail unexpectedly. The researchers conducted the study to assess how vehicle service shops or
garages perform daily operations and transactions. The researchers gather initial data and found out
that most vehicle shops or garage still uses manual processes in handling their day-to-day transactions.
Recording of customer records, monitoring of vehicle repair progress, vehicle service updates,
transactions with clients, and billing are still done manually. Continuous use of manual methods will
slow the operation and response time of the garage to the inquiries of the customers. The researchers
have seen the need to upgrade the way how vehicle servicing garage operates. The implementation of
the system will both benefit vehicle garages and customers. For vehicle garages, utilizing the system
to operate the business will help them grow and increase business efficiency. For customers, they can
easily and conveniently make transactions for vehicle servicing.
Standards with the advent of the Internet of Health (IoH) age, traditional medical or healthcare
resources are slowly moving to the web or the internet and generating a large amount of medical data
associated with patients, doctors, medications, medical infrastructure, and so on. The effective
integration and analysis of this IoH data are excellent indicators for disaster diagnostics and medical
care services. However, IoH dthe is usually distributed to different departments and contains the
privacy of the users. Therefore, it is often a challenging task to compile or extract sensitive IoH data,
where user privacy can be disclosed. To overcome the above difficulties, we prioritize a multi-source
medical data collection and mining solution for better health care services, called PDFM (Data Fusion
and Private Mining). With PDFM, we can search for similar medical records in a time-saving and
confidential manner, in order to provide patients with better medical and health care services. A test
team is developed and used to demonstrate the feasibility of a proposal for this task.
Globally the amount of individuals of all ages visually impaired is calculable to be 285 million, of
whom thirty-nine million are blind. For these people knowing the surroundings learning about
anything is difficult compared to normal people. Some of them have personal assistants/ helpers to
help with this problem but a lot of them don’t. The main aim is to assist & support visually challenged
persons. Machine learning algorithms are used in a wide variety of applications, such as email filtering
and computer vision, where it is difficult or unfeasible to develop conventional algorithms to perform
the needed tasks. Deep learning has become the dominant approach for much ongoing work in the
field of machine learning. Deep learning (also known as deep structured learning) is part of a broader
family of machine learning methods based on artificial neural networks with representation learning.
Learning can be supervised, semi-supervised or unsupervised.
1,2 Assistant Professor, Dept. of CSE, SCSVMV(Deemed to be University), Kancheepuram ,TamilNadu, India
In the health-care industry, a system is critical for managing the administrative, financial, and clinical
components of a hospital. Accurate analysis of medical data aids early illness detection, patient
treatment, and community services, thanks to advances in data mining in the biomedical and
healthcare communities. When medical data is of poor quality, the precision of the study suffers.
Furthermore, different regions have distinct appearances of specific localised diseases, which may
make disease outbreak prediction more difficult.Machine learning techniques are provided in the
proposed system for effective prediction of various illness occurrences in disease-prone populations.
It tests the different estimation models on real-world hospital data. It uses a latent component model
to reconstruct missing data to address the challenge of incomplete data.It was tested on a cerebral
infarction that was a regional persistent condition. It employs the Machine Learning Decision Tree
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
40 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
technique to analyse structured and unstructured data from the hospital. It mines data sets to anticipate
likely diseases and hospitals. To our knowledge, no existing work in the field of medical big data
analytics has focused on both data types. When compared to various common estimate techniques,
our suggested algorithm has a calculation exactness of 94.8 percent and a convergence speed that is
faster than the Decision tree disease risk prediction algorithm.
1, 2 Assistant Professor, Dept. of CSE, SCSVMV (Deemed to be University), Kancheepuram, TamilNadu, India
The Beginning of numerous years the technology is developing in many ways along with development
social networks also developed. In these social networks many news is spreading throughout in this
online world and in this news some news the real and which are fake. These fake news for various
fields that are political, commercial purposes has been arriving in huge count and spreads through
online social networks. By these fake news social networks users can get infected easily, which has
bought tremendous impact on society. An important aim is to improve the trustworthiness of
information on social networks is to detect the fake news frequently. This paper aims to investigate
the methods, principles and algorithms to identify the fake news articles, creators and subjects from
social networks and evaluating the performance. Information preciseness on social media is an
increasingly important corner, but web-scale hampers, ability to identify, evaluate correct the
information or so called "fake news", present in these platforms. In this paper, we propose a method
to detect ''fake news" and ways to apply it on social media. The outcome results may be improved by
applying various techniques and methods that are discussed in the paper. Outcome results suggest, the
fake news detection problem can be addressed with machine learning methods.
In the advanced period, there is various measure of sickness, crises that are happening step by step.
However, innovation has grown a ton, a few arrangements are fundamental in the clinical world as we
can see many individuals experience the ill effects of various medical conditions. As a solution for
this, we have come up with an idea to safeguard people’s life by sitting inside their home, a unified
health care system using web frameworks where we have included technologies like react js, bootstrap
as frontend, node js, and PHP as backend, MongoDB/MySQL as backend. As we considered
associating specialists using video call which can make individuals counsel and get analyzed and help
prescriptions and other information through video call. Alongside this, we have carried out different
highlights which empower individuals to handily get to individuals in touch. We have provided
different solutions in different parts that might include pill reminder, secured prescription storing,
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
41 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
doctor consultant using a toy, ambulance service, video conferencing with doctors. So that might
reduce the problems in these hard times.
G. Barkavi
Dept. of IT,
Kalasalingam Academy of Research and Education
Tamil Nadu, india
V. Vasudevan
Senior Professor
Dept. of IT,
Kalasalingam Academy of Research and Education
Tamil Nadu, india
S. Aishwarya
Dept. of IT,
Kalasalingam Academy of Research and Education
Tamil Nadu, india
India innovation index by NITI Aayog reports (2020) shows the Index framework. Performance output
from Macroeconomic indicators. These Indicators compared with some of the significant innovation
index studies for the difference in the outcomes and implications. The analysis also brings out a few
challenges identified. The findings of this study are that some of the areas critical as innovation capital
remain unexplored by this India innovation index framework. Knowledge management has some
lacuna, especially for following the Innovation success and outcomes within the Indian systems. The
paper identifies these challenges and problems for future work to address them.
Furthermore, the findings are the challenges to the present index where there is no recourse to a
regulation mechanism as these are aggregates. Moreover, the inconsistencies in the measures for
yearon-year patterns are further critically observed. The implication of this study is the three
challenges identified. Moreover, human resource development has also been analyzed for five years,
with inconsistencies. The paper critically analyses the implications of the resilient Innovation Index
for India.
Early detection of lung cancer is the only possible way to improve a patient’s chance for survival. A
Computed Tomography (CT) scan used to find the position of tumour and identify the level of cancer
in the body. The current study presents an innovative automated diagnosis classification method for
CT images of lungs. In this work, the CT scan of lung images was analyzed with the assistance of
Optimal Deep Wavelet Autoencoder-Based Deep Neural Network (ODWADNN).A most accurate,
reliable and fast automated method was implemented to segment the liver tumour image using
AcceleratedGreedy snake’s algorithm (AGSA).Next, a technique for image compression using a deep
wavelet autoencoder (DWA), which blends the basic feature reduction property of autoencoder along
with the image decomposition property of wavelet transform is proposed. The combination of both
has a tremendous effect on sinking the size of the feature set for enduring further classification task
by using DNN. Here, the proposed RCSA is employed for training the DBN. The proposed RCSA is
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
43 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
designed by integrating the rider optimization algorithm (ROA) and Cuckoo Search (CS). A CT image
dataset was taken and the proposed DWA-DNN image classifier was considered to classify lung
nodules as normal, benign and malignant.The discussed method increases the lung cancer prediction
rate which is examined using MATLAB-based results such as Accuracy, Specificity, Precision, Recall
and F1 score.
V.Tharakeswari1,1*, M.Kameswari2
1Department of Mathematics, Kalasalingam Academy of Research Education, Krishnankoil,
Tamilnadu, India-626126
1*Department of Mathematics,J.N.N Institute of Engineering, Usha Garden, Kannigaipair,
Thiruvallur,Tamilnadu, India-601102
2Department of Mathematics, Kalasalingam Academy of Research and Education, Krishnankoil, Tamilnadu,
India-626126
The linear programming problem is well-known as one of the most promising mathematical methods
for efficient resource allocation. Many real-world problems can be expressed as LPPs. Anyways in
occurring each day scenarios; it is arduous to obtain appropriate accurate data for the cost parameter,
resulting in a fuzzy environment. The subject of fuzzy transportation has a lot of consideration in
present-day. It assists the decision-maker in arriving at the best answer with appropriate data, which
is frequently used in engineering and management science situations. The prevalent goal of the
transportation problem to reduce the amount of transporting a production from multiple origins to
multiple targets. It is necessary to highlight the issue of balanced and unbalanced transportation. We
used the defuzzification method for hexagonal fuzzy numbers and offered novel approaches in this
research to be helpful for determining an IBFS for balanced and unbalanced transportation problems.
Credit Risk analysis of customers protects and ensures Banking institutions’ interests and have been a
core part of any financial system. Traditional Banks have been using decades old legacy systems for
all of their processes and these systems are no match for current Machine Learning and Deep Learning
algorithms. XGBoost is a tree-based distributed gradient boosting framework famous for its efficiency
and flexibility. The performance of XGBoost largely depends on its hyperparameters which can be
optimized. Methods like GridSearch and RandomSearch are largely used for hyperparameter
optimization but are inefficient in nature. This paper proposes a XGBoost based algorithm optimized
by Adaptive Tree Parzen Estimators (ATPE) for Credit Risk analysis. The hyperparameters of the
proposed algorithm, when optimized with ATPE give better results compared to the default model and
thus it can be used as a replacement for the legacy systems used in Banks for Credit Risk analysis.
The boom of social media networks, tend to increase the magnitude of multimedia content. This leads
to the evolution of the new field called Multimedia Internet of Things. As these devices are
resourceconstrained, there is a need for lightweight image encryption techniques to safeguard
multimedia data.
The proposed lightweight encryption algorithm is based on Chaotic theory since it become more
prevalent in current multimedia cryptography. This chaotic-based multimedia encryption tech- nique
uses 2D augmentation models for safe data transfer. The proposed technique not only preserves
the high encryption quality of chaotic maps but also have minimal residual clarity and key sensitivity.
The lightweight image encryption algorithm uses the Chaotic map model used for achieving
confusion and diffusion properties. We have also proposed a novel key generation algorithm used on
Rubik’s cube transformation and Logistic map. The initial values are generated using the Elliptic-
curve cryptography (ECC) key algorithm. The proposed system is applied on both medical images
(grayscale) as well as coloured images for analysing the computational complexity. As per the security
analysis, histograms of the encrypted images are gener- ally flat and dispersed over all pixel values.
These pictures exhibit average correlation values of 0.0010575 (horizontal), 0.013994 (vertical), and
0.00235 (diagonal), with an entropy of 7.86046675 (encrypted image). Therefore, the proposed
lightweight image encryption exhibits a high level of security.
Music has become an integral part of our lives. While emotions may be easy to describe, the intricacies
of emotions are harder to determine when one is experiencing them. Emotions are easier to understand
retrospectively. While experiencing strong emotions, one can easily get overwhelmed and bring rise
to feelings like loneliness, and other unhealthy emotions which can progress towards mental illness.
This project enables one to perceive emotions through music, thereby helping them realize and
acknowledge their emotions. This in turn serves as a medium to help one realize that they are not alone
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
45 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
because ultimately everyone listens to music. An emotion recognition algorithm is used with the help
of CNN, to determine the specific sentiment the individual is currently feeling and then recommend
specially made playlists of songs for them. It is not always evident that a person going through a tough
phase may open up about their feelings to people around them and hence making use of AI/ML to
identify a person’s emotion through their facial expressions captured over a span of time can help
them in getting over their emotions.
Queries are the heart of analytics. Without them, there is no analytics. Data analysis is helping the
enterprise to make the final decisions on customer trends and predictions and the queries would be
large and take much time to execute on the cluster. This project would help queries to execute on
different platforms based on the configuration and cache the response for future reference by using a
database. The project helps customers to analyze the data faster and they can use it further for making
the decision. In Enterprize data is important. In companies, Decisions are to be made by the large
volume of data. We cannot store the huge volume of data in Relational databases and we can't update
it because it is vertical Scala. But Here Hadoop in HDFS is horizontal Scala and it stores a large
volume of data in a distributed manner. Our project helps in transferring data from Relational
databases like MySQL to Hadoop and it will be accessed by the Java Database Connectivity (JDBC).
The accessed data will be converted to the JavaScript object notation (JSON) format by using the
Gson library. The converted JSON format will be stored in a database for future use.
One of the non-pharmaceutical strategies for minimising the main origin of COVID spat by any
individual already infected by the virus, is to wear a mask. This study aims to create, real-time system
that is highly accurate as well as is capapble of detecting any non-masked faces anywhere and force
people to wear masks in order to contribute to communal health. In this suggested system, modern
deep learning algorithms were integrated with geometric techniques to develop a robust modal that
covers three aspects of detection, tracking, and validation. As a result, the proposed approach benefits
society by saving time and lowering corona virus transmission. It can be useful in the current situation,
where the lockdown is being lifted to allow people to be inspected at public meetings, shopping malls,
and other locations. By lowering the number of persons required to inspect the public, automated
inspection saves time and money. It can also be used in any situation.
Department of Computing Technologies, School of Computing, SRM Institute of Science and Technology,
Potheri, Kattankulathur-603203, Chengalpattu District, Tamilnadu, India.
Sign language is a symbolic representation used by deaf people as their primary language. Unlike
acoustically conveyed sound patterns, sign language makes use of body posture and physical
communications to effectively express a person's words. It could be used to connect with people who
have trouble speaking, as well as non-hearing challenged people. With the development of new
technologies such as online applications, machine learning, and natural language processing, our
initiative intends to bridge the gap between these Deaf people and regular people. The main purpose
of this project is to construct a software/interface which accepts Audio/Voice as input and outputs
them to corresponding Sign Language for ill-hearing people. Hand forms, posture, and body
movements are all coordinated at the same time. The approach has 2 parts: first, it converts speech
into text using voice-to-text API; second, and then it represents the text using Parse Trees and uses
Natural Language Processing semantics (NLTK particularly) for lexical analysis of Sign Language
Grammar.. The work builds upon the rules of ISL (Indian Sign Language) and follows the ISL rules
of Grammar.
Ms.M. Aishwarya
Department of Computer Science
SRM Valliammai Engineering College
Chennai,
Ms.T.Aparna
Department of Computer Science
SRM Valliammai Engineering College
Chennai,
Ms.K.Divya
Department of Computer Science
SRM Valliammai Engineering College
Chennai,
Understanding music quality is very important not just for the artists World Health Organisation
produce and perform music however conjointly for the music-related trade. it's not been studied well
however music quality are often outlined, what its characteristics square measure, and whether or not
it are often foreseen, that square measure self-addressed during this paper. AEFS will choose the
foremost vital options by excavating each linear and nonlinear info among options, that is additional
versatile than the standard self-representation methodology for unsupervised feature choice with
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
48 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
solely linear assumptions. Deep Neural Networks (DNNs) are gaining progressive accomplishment
compared with several ancient Machine Learning (ML) models in numerous fields. Extensive
experiment results indicate that AN improvement algorithmic program will create effects on the DNN
model sensitivity to adversarial examples. That is, once coaching models and generating adversarial
examples, Adam optimizer will generate higher quality adversarial examples for structured datasets,
and Adadelta optimizer will generate higher quality adversarial examples for unstructured datasets.
additionally, the selection of optimizers doesn't have an effect on the fungibility of adversarial
examples.
Cities are spatially, culturally, socially, economically, politically, legally, democratically and
ecologically defined as a system. A Spatial System can be obtained from the land usage and urban
networks or services. Cities have the ability to uplift even a nation, modifying a city to a smart city to
make smarter nations by planning, management, governance and development systems. Presently,
planning a system gives the master plan, zonal plan,urban land management schemes and site planning
schemes to arrive at the goals of the spatial system that needs a keen re-look for creation of smarter
city. All the Management and governing systems currently in work are the legacy colonial with
inappropriate hierarchical system that is less responsive and in real-time outmoded cumbersome for
end users nowadays.
1Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
1Department of Bioinformatics, School of Life Sciences, Professor & Head, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
A genetic disorder in individuals is caused by the inheritance of two alleles from the parents. This
review focuses on various techniques that are used to diagnose or predict the possibility of a genetic
disorder in patients. The conventional methods of prediction of genetic disorders use family histories
and lifestyle factors, this approach may decrease the prediction accuracy. Therefore, introducing
genetic risk score prediction based on SNP will increase the prediction accuracy and reduce the overall
screening time of medical history. These predictions are done by taking a few samples of blood or
sputum from the patient and sequencing the DNA to find the gene patterns. Genetic disorders can be
caused by both dominant and recessive alleles. The prediction is done by finding the gene in a
sequence that is increased or decreased in size; this is called Copy Number Variation (CNV). There
are many studies focused on finding the correlation between the CNV of two different genomes.
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
49 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
Researchers used many techniques to find the correlation between CNVs including machine learning,
signal processing techniques. We carefully analyzed more than 50 peer-review journals and compared
various methods to find the similarity in various techniques.
Biotinidase deficiency is a rare genetic disorder brought out by BTD (Biotinidase gene) mutations.
Genetic disorders are not curable but there are drugs available for suppressing Biotinidase deficiency.
To overcome this problem a vaccine that is much effective is needed. The goal of the current research
is to develop an effective multitudinous epitope-based vaccine. Biotinidase protein was chosen as a
target, and various epitopes like B-cell and T-cell were predicted. Predicted epitopes were shown to
be stable, non-allergic, antigenic, stable, and responsive. Finalist epitopes were significantly antigenic
and overlapped. Using In silico Techniques, we predicted the Primary, secondary and tertiary,
stability, MHC class I and II binding properties, and ligand-receptor interaction for vaccine designing.
This vaccine shows high affinity with the human receptors IL-2 alpha and a beta chain. Further the
sequence was optimized for expression in a prokaryotic host and cloned into the pET-28a plasmid.
Docking studies further demonstrated that the forecasted peptides interacted with HLA-B7 allele. The
predicted vaccine could be a promising starting point for vaccine development against genetic
disorder. Furthermore, the suggested vaccine must be subjected to in vitro experiment and further
confirm to verify its immunogenic and safety profile.
Agriculture is one of the main factors that determine the growth of a country. In India itself, about
65% of the population lives on agriculture. Due to different seasonal conditions, plants can be infected
with different kinds of diseases, which can affect the leaves of plants. First, the plant is infected, and
then the whole plant, which in turn affects the quality and quantity of plant growth. Because there are
many plants in the yard, it is difficult for human eyes to identify and classify the diseases of each plant
in the field. Since these diseases can be transmitted, it is very important to diagnose each plant.
Therefore, in this document, we introduce the automatic detection and classification of plant leaf
diseases based on artificial intelligence to quickly and easily identifies, classify and perform the
required tasks. Medicine to treat this disease. This is one way to achieve our goal of increasing
agricultural crop yields. In this method, we followed several steps i. Image acquisition, preprocessing,
segmentation and classification of images
Here, we introduce a face mask detection model which is based on computer vision. The proposed
model can be integrated with computer or laptop cameras allowing it to detect people who are wearing
masks and not wearing masks. The model has been put together using deep learning and classical
machine learning techniques with openCV, TensorFlow and keras. We have acknowledged about a
comparison between three machine learning algorithms to find the most suitable algorithm that yields
the highest accuracy. Using face mask recognition technique by using python programming and from
OpenCV library Haar cascade method. Object Detection using Haar featurebased cascade classifiers
is an effective object detection method proposed by Paul Viola and Michael Jones. Another research
in which hybrid model using deep and classical machine learning for face mask detection is presented.
A face mask detection dataset consists of with mask and without mask images, then using OpenCV to
do detection from a webcam. For this project Viola-Jones Algorithm method is used for face mask
detection.
1Mr. A. Niranjan 2V.K. Ramdas Coundinya 3R.V. Sarath Kumar 4T. Ravi Teja
1Assistant Professor, Department of Electronics & Communication Engineering, SCSVMV, Kanchipuram,
India.
2,3,4 UG Scholar, Department of Electronics & Communication Engineering, SCSVMV, Kanchipuram, India.
In this project, we will be designing an advanced doorbell that ensures safety from COVID-19
pandemic as it is fully touch proof. What If the person who came to our house cannot find the doorbell
or if the person has fever or if they maybe covid affected, what can be done to ensure?
How will it be if we use an automatic doorbell which checks their temperature and gives us instructions
whether it is safe or not to let them inside and ring the bell only when he is good? There are no more
hassles. The person who comes to our house need not search for the doorbell and press it anymore. If
we install this automatic doorbell using an object detection circuit on the door itself, the circuit will
automatically sense the presence of the person and ring the doorbell.
Janani S
Student, Information Science and Technology
College of Engineering Guindy, Anna University
Chennai, India
Yoheshwar S
Student, Information Science and Technology
College of Engineering Guindy, Anna University
Chennai, India
Keerthana S
Student, Information Science and Technology
College of Engineering Guindy, Anna University
Chennai, India
Dr.K.Indra Gandhi
Assistant Professor(Sl.Gr), Information Science and Technology
College of Engineering Guindy, Anna University
Chennai, India
Anatomy is the important subject for school level science students and medical students. Upper Limb
anatomy is very complex. Memorising the details about all parts of upper limb is difficult and need
much imagination. Virtual Reality (VR) is the best tool for the enhancement of learning process of
upper limb anatomy. This helps students in the thorough understanding of the upper limb anatomical
structure based on visualisation rather than memorising. Three Dimensional (3D) models of shoulder,
forearm, arm and hand are created with its complete internal structure using Computed Tomography
(CT) Digital Imaging and Communications in Medicine (DICOM). Refinement of 3D models is done
further. Models created are rendered in virtual environment in unity. Anatomical labelling, audio
description about the parts is also added. Finally well refined model is rendered in virtual environment
using which students can learn the internal structures effectively. So our ultimate goal is to develop a
VR application where students can learn upper limb anatomy through 3D models.
During the last few years, text mining has become increasingly significant. Users may now access
news from a number of sources, including electronic media, digital media, print media, and many
more. In this paper, we focused on text classification, classifiers, and a variety of feature extraction
strategies, but only for short texts, such as news categorization based on headlines. There are few
resources for all Indian languages, and the majority of them are not frequently utilized in text
classification. Existing classifiers are mostly focused on accurately recognizing English news
headlines, with minimal attention paid to Indian languages.
This paper presents an extensive comparison of predefined models vs a CNN model for English, Hindi,
and Gujarati news headlines. Our experimental results showed solid performance of all models on the
English dataset with a minimum accuracy of 89.33%, achieved by RFC, and top performance of
95.04%, achieved by MNB. As for Gujarati dataset and Hindi dataset, CNN achieved the highest
overall accuracy of 89.12% and 87.58% respectively. All the models can classify headlines into 5
categories for all datasets.
Anjali Agrawal
Computer Science and Engineering
B.Tech.
of SRM Institute of Science and
Technology
Chennai, India
Dr. S. Prabakeran
Department Of Networking And
Communications of SRM Institute of Science
and Technology
Chennai, India
Preeti Vijayan
Technology Consulting - BI & Analytics
Tiger Analytics
Chennai, India
User-intensive software, like mobile applications and websites, heavily depends on interactions with
many users and an unknown population. With the internet connectivity on such software, the website
allows evaluating ideas and innovations using continuous experiments like A/B tests, split tests. We
aim to study the application of A/B testing in various industrial contexts. We will also present a brief
study on different statistical tests for different assumptions and solve them using the Bayesian
algorithm. Randomized algorithms are used to address various software engineering problems. This
type of algorithm gives different results with every run for the same problem instance. Therefore, a
statistical test is important to prove the conclusions derived from the data.
Digital twinning is a visual representation of a visual object designed to reflect exactly. The object
being investigated - that is The data is collected from sensors to generate energy and other aspects of
material activity. This data is later sent to a processing machine, where it is used in digital copy. This
paper proposes a method where digital twinning uses machine algorithm with 5G Network and it also
uses simulation program that allows replicate the orginal product or source. It creates a virtual to
physical twinning making it more effective.
M. HANUMANTHA RAO
Department of Computer Science and Engineering.
Hindustan Institute of Technology and Science. Chennai, India.
Dr.MAGDALENE R
Department of Computer Science and Engineering.
Hindustan Institute of Technology and Science. Chennai, India.
Chatbots are software developed using machine learning to stimulate a conversation with a user in real
time. Chatbots have important role in news, social media, transactional and customer service. Users
engage with chatbots every day on their devices even without realizing. Chatbots can provide news
updates, sport updates and bank applications. We can implement the chatbots in medical industry for
patient care and health guidance. Chatbots will improve medical care delivery and will also lead to
significant healthcare cost savings.
Swetha.P1, Joshua Amrish.A2, G. Gnancy Subha3, Dr. Chitra Sudhakaran4, Raveena.R5, Parveen Meera.S6
1,2,5&6Department of Biomedical Engineering, SPIHER.
3Assistant Professor- Department of Biomedical Engineering, SPIHER.
4Associate Professor- Department of Biomedical Engineering, SPIHER.
Asthma is a lung illness caused by inflammation and airway obstruction that produces shortness of
breath, wheezing, and often life-threatening attacks. Patients with asthma must be able to predict
severe exacerbations caused by uncontrolled asthma. As a result, a framework that can accurately
forecast the likelihood of asthma in a patient is required. By mining the data comprising patients'
previous health records, an effective mechanism for asthma disease prediction has been developed in
this research. To display the results, we employ machine learning algorithms. KNN, ANN, SVM, and
Linear Regression are four machine learning classification algorithms employed in these trials to
predict asthma disease at an early stage. The efficiency of all four models is assessed using a variety
of metrics. The accuracy of a classification system is measured by the number of cases that are
classified properly and inaccurately. The results of the experiments demonstrate that SVM techniques
have the highest accuracy. MATLAB software is used to display the outcomes of the experiments.
Sanjeev C P
Department of Electronics and Communication Engineering
Sri Krishna College of Engineering and Technology,
Coimbatore, India.
To realize productivity of delaying the existence over sensor networks several plans hold been
proposed. Among this plans, a bunching convention is an wonderful approach up to expectation drags
out the existence on an organization. Notwithstanding, in applying that technique, a few hubs
burnthrough energy superfluously so a result over a local weather whereby the gathered records on
the sensor hubs effectively covers. In that paper, we endorse a Clustered Multi-hop Routing Algorithm
as decreases superfluous facts transmission amongst hubs by means of but the duplication of
information. This strategy forestalls data misfortune added respecting by means of connect
disappointment problem then consequently the records is gathered dependably. As indicated via the
consequences on the present examination, our approach lessens the electricity utilization, expands the
transmission proficiency, then delays community quick so contrasted with the cutting-edge bunching
strategies.
This project, Smart Power Monitoring and Control Systems, is one of the few ways to use the Internet
of Things. Thanks to the Internet of Things, energy-efficient gadgets can be created, reducing both
energy and human use. As part of this project, we aim to develop a smart charging system that
improves battery life by reducing battery pressure and automatically controlling its use. web server
and battery charged. On the IoT platform, there is an ESP8266 module, and the web server is stored
in the module. Because webserver is platform-agnostic, it can be used on any device, including
smartphones. These devices send commands to the web server. This project helps with automatic
monitoring of the device and notification of the smartphone, and thus saves both the energy and time
required to maintain the equipment. The battery can be charged once the device is connected, and it
can be charged only when necessary, and the system can monitor other. Electrical items. Battery life
may be extended by minimizing the fast charge by switching over the corresponding connection to
the series.
The main purpose of “Online tour booking website” is to provide a convenient way for a customer to
book hotels, flight, train and bus as a single package for tour purposes. A customer finds it very
difficult to search for the best package as he/she has to browse multiple websites, contact many travel
agents, etc. which is a tedious process and is time consuming. There should be a system where the
user should find the best package on the Internet with a single click. To address this issue, we created
an online tour booking website which offers the best package among all the other packages that are
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
56 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
on the web. A customer will select a travel package for a particular place based on the
recommendations provided by the previous customers who had experience with the package. If the
customer likes to visit a particular place, they can easily search the place on the website. They can
also suggest a customized package and send it to us through the contact page. We included a map view
for the specified route. The website is very user-friendly which helps the user to book easily. They
can directly contact us through the mail facility given on the contact page.The objective of this project
is to develop a system that automates the processes and activities of a travel agency. In this project,
we will make an easier task of searching places and for booking train, flight or bus.This application is
to provide best traveling services to the customers and travel agents. We have developed tours and
travel management systems to provide a search platform where a tourist can find their tour places
according to their choices. This system also helps to promote responsible and interesting tourism so
that people can enjoy their holidays at their favorable places. This system also helps to develop tourism
with different cultures so that they enrich the tourism experience and build pride. We develop this
system to create and promote forms of tourism that provide healthy interaction opportunities for
tourists and locals and increase better understanding of different cultures, customs, lifestyles,
traditional knowledge and beliefs. This system also provides a better way to connect with various
events.
The development of novel technologies has led to an upsurge in the demand for precise localization
in outdoor as well as indoor environments. As GPS continues to provide sufficient positioning
precision in outdoor settings, its accuracy falters in indoor scenarios, which necessitates the
development of novel positioning approaches that function accurately both indoors and outdoors. The
use of various WLAN parameters for localization has been conceptualized. In this study, we attempt
to do localization using Machine Learning methods on WLAN RSSI measurements. We compare the
performance of multiple machine learning algorithms on the dataset to see which can be used to design
efficient future localization systems. The proposed study has achieved second place for the problem
statement "ITU-ML5G-PS-016: Location estimation using RSSI of wireless LAN" in AI/ML in 5G
Challenge 2021 organized by the International Telecommunication Union.
Investigation of human intelligence has assumed considerable importance to the cognitive scientists
during the recent past, since executive control is the single biggest differentiating quality of the human
brain, even during early childhood education. It is housed in the neo-cortex, the area that has
developed most recently in our evolution. Specifically, the large and significant complexity developed
in the prefrontal cortical area (PFC) of the brain is a unique feature of humans, as compared to even
the great apes. Within the lifetime of a human being, the PFC in human babies has been considered
to evolve later than the more primitive parts of the brain – it happens in early childhood and into
adolescence, as demonstrated by the relative lack of self-control exhibited by babies and toddlers, but
with increase of such control through the years of growth. While the PFC is broadly responsible for
executive control of all sorts, specific functional areas doing specific roles have been delineated by
studies using modern imaging techniques. Even so, there is some variability in findings and indeed
even some conflicting results. This paper has evaluated the various roles played by the dorsolateral
Pre-frontal Cortex (dlPFC) in the human brain, based on the extensive survey of reliable published
data on the subject. In young children, the role of the dlPFC is evident in the form of temptation-
resistance and aggression-regulation. Understanding of the specifically delineated roles of the dlPFC
is especially relevant now given the exposure of even very young children to social rejection, making
them vulnerable to greater aggression as a defensive response. This investigation has clearly revealed
that the dlPFC has been repeatedly implicated in certain executive functions, while variably implicated
in some others. Based on the preliminary study, an attempt has been made to delineate the ones that
have the most likely direct relationship with the dlPFC. For adults, this has implications in the study
of depression, treatment options for Alzheimer’s, autism, Parkinson’s disease, and other prevalent
neurological deficits. During early childhood, it potentially provides the basis for helping children
manage their emotional responses and develop controlled, well-deliberated behavior in response to
social challenges.
The rapid pace of recent advances in the realm of Artificial Neural Networks (ANN) and the
simultaneous developments in the space of brain function study have led to a dual-development of
neurosciences and neural networks in tandem. Several instances exist where the two realms have
taken inspiration from each other to make large leaps of progress. In this paper, we have analyzed the
recent convolutional neural network (CNN) algorithms that provide insights into the workings of the
biological brain in visual perception. We have also identified the challenges and possibilities of
interdisciplinary work through symbiotic collaboration between these disparate fields of research.
In this period of innovation, the internet has spread broadly and has been utilized for various purposes
by children. Particularly usage of the internet among school students increased in recent years. At the
same time, researchers indicate that there is an increase in internet usage and behavioral problems.
The objectives of this study are to examine the impact of internet usage and parental mediation on
school children. The participants were determined with purposive sampling and conducted under
different schools children in Chennai (N= 424) respondents and from the 14-17 age groups those were
analyzed by CART used to describe decision tree algorithms that are used for a classification tree
model and regression. These results show that most children used the internet without parental
guidance. During pandemics, time children are using more than hours on the internet and social media
which impact their online activities of children. This study identified to regular monitoring is expected
to avoid psychologically harmful effects. The future lives, health, and psychological changes of
children, and online abuse.
Dimensionality Reduction (DR) is the process of reducing the numerous features or random variables
under consideration to a limited number of features by obtaining a set of principal variables. These
techniques cater great values in machine learning, which come in handy to simplify a classification or
a regression dataset, thereby yielding a better-performing predictive model. Techniques used for DR
include Feature Selection methods, Matrix Factorization, AutoEncoder methods, and Manifold
Learning. Merits of DR include data compression, reduced space of storage, and removal of redundant
features. This paper attempts to review various techniques used to carry out dimensionality reduction
while providing an exhaustive comparative study over the merits and demerits of each of the
techniques used under the empirical experiments performed by the authors whose work is being
reviewed.
Solar Energy is a renewable source of energy and it is easy to extract electric energy from it. But many
factors such as dust deposition, size of solar panels, affect the efficiency. Mainly, the deposition of
dust on the surface of the panel reduces the output power. At present, regular manual checking is
required to monitor the accumulation of dust on the solar panel that causes a drop in output voltage.
Current theft prevention system has limitations like alerting the consumer even when insignificant
objects pass through the mechanism installed. This inefficient performance may lead to theft and loss
in investment. If above-mentioned problems are given proper attention, we can avoid theft and prevent
loss of power generated from solar panels. This paper gives a detailed review on Solar Panel Dual
Management System which can detect unauthorised activities and automates the detection of dust
deposition on solar panel.
The transmission of digital medical images for e-health services has recently piqued people's curiosity.
However, current implementations of this service do not place a high priority on patient confidentiality
and data security. In the medical field, the necessity for quick and secure communication is critical.
Nowadays, picture transmission is a daily occurrence, and it is vital to establish an efficient method
of doing so via the internet. We present a new technique for ciphering a picture for safe and denoised
transmission in this study. Image cryptography, data hiding, and Steganography are all discussed in
this paper. We introduce a new medical image Steganography technique for securing patients'
sensitive information by embedding it in the image itself while keeping excellent image quality and
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
60 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
embedding capacity, and we use LSB substitution based nine pixels differencing in this project. In
addition, a hybrid paradigm based on key there in public sphere Steganography and Elli Curve
Cryptography (ECC) have already been developed. Which approaches are much more secured as using
an unique ECC or steganography.
Ubiquitous user demands are increasing and they commonly opt for networks that always offer a
pleasant seamless connection. A well-known and vital requirement is an unbroken drift of voice and
data with transceivers. In a state of affairs just like the non-stop mobility of the mobile terminal, the
attached access point may relinquish its connection because of the fluctuation of signal power. A
single operator to handle the network connection for the mobile terminal is not capable to fulfill the
user demands when they are in high mobility. So the handover process is crucial for seamless
communication. The mobile terminal's vital task is to select the best network from the number of
available networks. In the network selection process right here we use a combined technique called
Fuzzy TOPSIS (Fuzzy Technique for Order Preference by Similarity to Ideal Solution) and Fuzzy
AHP (Fuzzy Analytic Hierarchy Process). Different parameters are also considered to recognize which
one is best to carry the devices.
In this work, hybrid GA & PSO is used to group the mobile nodes based on the similar behaviour in
MANET. The devices in this network have the freedom to go anywhere in any direction at different
speeds. The unpredictable movement of a node makes a non-stable network, loss of energy, and
repeated changes in topology. This migration behaviour of the devices leads the network to become
dynamic. Non-stability may cause link failure, packet loss, repeated root-finding overhead, energy
loss, topology change, routing table update, etc. To make the network turn out to be standard, cluster
formation is proposed to assemble a number of individuals into groups. Balanced clusters are required
to give a long life for the cluster members & clustering can achieve scalability. Clustering is organizing
things into meaningful groups based on the similarities among the devices. In this grouping system,
there is a cluster head selected for each & every group based on the parameters like mobility, distance,
energy, degree of connectivity, and transmission range. The cluster members are associated with the
CH based on the mobility of the individuals. The Mobility Aware Energy Efficient Hybrid GA & PSO
is proposed here to form the cluster.
3Architecture & Planning department, Malaviya National Institute of Technology, Jaipur, India
India is a water-stressed country where demand will outstrip availability by a ratio of two by 2030,
putting hundreds of millions of people at risk of acute water scarcity (Niti Aayog). The power sector
in India is heavily reliant on water. Thermal power plants generate over 80% of India's electricity
(CEA 2017), and they rely on water for cooling. Another 10% of electricity is produced by
hydropower plants, which purely run on water. Any modifications to either the energy or the water
system are likely to affect the other system directly or indirectly. Water and energy are intrinsically
linked. There are multiple cases where power plants have been forced to shut down permanently or
temporarily due to a lack of water. As the population grows, so does the demand for energy, putting
strain on our water supplies. This paper aims to identify the problems and prospects in power sector
in relation to water consumption. There are few rules and regulations concerning water usage in the
power sector. There is limited policy for water consumption in power plants and no perspective for
tackling water scarcity in the future; hence, the study on water energy nexus becomes vital for
managing water resources across all countries.
In this paper, we are going to propose “iot&rfid wireless vehicles charging using arduino Due to
increase in price of petrol and to decrease ecological contamination, the utilization of electric vehicles
(EV) is quickly expanding, rather than ignition motor vehicles. The primary concern issue of the EV
clients is being tended to through different charging strategies. The vital trouble in execution of EV is
course of action of charging framework. The remote charging framework (WCS) is a most loved
choice in the developing EV market.
As the new time of the auto, the business is quickly changing from an IC motor vehicle to an electric
vehicle. The interest for an electric vehicle is expanding, these lead to an expansion in charging station
too. In this task, a remote charging framework is utilized to charge the vehicle remotely by means of
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
62 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
inductive coupling. we essentially need to leave the vehicle on the charging spot. The transmission of
electrical energy from source to stack from a distance with next to no directing wire or links is called
Wireless Power Transmission. This framework doesn't need any human cooperation. The aftereffect
of this venture is we can charge our vehicles remotely by means of inductive coupling and can transfer
the vehicle numbers to the cloud which are put away in RFID labels. Remote power transmission may
be one of the advancements that are one stage towards what's to come. This undertaking can open up
additional opportunities of remote charging that can use in our day-to-day routines.
The project presents a modern device for Assessment of various milk parameter monitoring system
using an IOT. As milk is the major food for all the infants, it has to be monitored for the safety of the
child and old ages people. The main objective of the project is to bring out the product (i.e. compact
device) which determines the quality and the safety of milk for consumption. This project determines
many parameters of milk by using five sensors. Here, we consider parameters like temperature , pH,
Color, Gas, Air sensors to determine the quality of the milk. The Temperature sensor is used to
determine the hotness or coldness of milk. The pH sensor is used to determine the pH of the milk (i.e.
whether Fat, Ammonia, Parteurised or Fresh or Rotten in its nature). The Gas sensor is used to
determine the smell of the milk. The Air sensor is used to determine the ethanol level of the milk. The
Color sensor is used to identifying the colour milk. By using the temperature , pH, Color, Gas, Air
sensors we can get output by displaying using LCD. By using tempature sensor Blynk Application
will send report to the mobile.
This project proposes the Online Food Ordering System. The case study aims to design and develop a
database maintaining the records of users. Our website provides management of users and their orders
along with the payment details and the delivery partners assigned bringing in an ease in the entire
functioning of online food ordering systems. By keeping efficient tracks of who was assigned to
deliver which order and what was the order amount along with customer details it first helps keep a
track of service and sale, and other, helps to manage complains, refunds and salaries of the deliver
agents.
Keratoconus is a medical condition wherein the cornea attains a conical shape caused by the thinning
of the corneal stroma. This thinning of the stroma results in irregular astigmatism, short sightedness
and corneal protrusion causing deterioration in the vision and even blindness. Symptoms depend on
the stage of the keratoconus with the early stages getting unnoticed. The advanced stages, though, can
be identified by vision loss and protrusion. Diagnosis and classification of keratoconus has gained
significance with the advent of imaging technologies and machine learning. Machine learning when
applied to the automatic diagnosis or screening of Keratoconus requires a large dataset, for better
accuracy, which is difficult to obtain. Data augmentation techniques have been employed to increase
the size of dataset. This paper presents a review of the augmentation techniques available in the
literature and compares the performances for arriving at a suitable technique for improved accuracy
of classification.
Huntington Disease (HD) is one type of neurodegenerative disorder which creates problems like
psychiatric disturbances, movement problem, weight loss and problem in sleep. It needs to be address
in earlier stage of human life. Nowadays Deep Learning (DL) based system could aid physicians for
providing second opinion in patient’s disease treating. In this work, human Deoxyribo Nucleic Acid
(DNA) sequence is analysed using Deep Neural Network (DNN) algorithm to predict the HD disease.
The main objective of this work is to identify whether the human DNA is affected by HD or not.
Human DNA sequences are collected from National Center for Biotechnology Information (NCBI)
and synthetic human DNA data are also constructed for process. Then numerical conversion of human
DNA sequence data is done by Chaos Game Representation (CGR) method. After that, numerical
values of DNA data are used for feature extraction. Mean, median, standard deviation, entropy,
contrast, correlation, energy and homogeneity are extracted. Additionally, the following features such
as counts of adenine, thymine, guanine and cytosine are extracted from the DNA sequence data itself.
The extracted features are used as input to the DNN classifier and other machine learning based
classifiers such as NN (Neural Network), Support Vector Machine (SVM), Random Forest (RF) and
Classification Tree with Forward Pruning (CTWFP). Five performance measures are used such as
Accuracy, Sensitivity, Specificity, Precision and F1 score. DNN, NN, SVM, RF achieve 100%
accuracy and CTWFP achieves accuracy of 87%.
The demand for improved and more rapid communication is growing because of the
widespread use and advancement of wireless communication in today's world. People's
need to send data as quickly as possible creates an automatic problem with spectrum
shortage. The network is heavily utilised during this period, resulting in increased
network traffic and resource strain. The utilisation of the network is delayed as a result.
The node became busy for the reasons mentioned above, which led to traffic. To spread
the workload and ensure that each node is balanced in this scenario, the load balancing
technique is used. However, the use of wireless communication has grown in recent
years, and load balancing is no longer sufficient to prevent traffic and impede network
performance.
M.Tejasri2
UG Student, Department of CSE
SCSVMV University, Kanchipuram
Tamilnadu, India
N.Ramya3
UG Student, Department of CSE
SCSVMV University, Kanchipuram
Tamilnadu, India
DML stands for Distributed Machine Learning. One of the most important AI technologies is DML
(distributed machine learning). Nonetheless, in the current distributed machine learning arrangement,
data integrity isn't taken into account. However, if network attackers alter or delete the data, the data
will be falsified. As a result, it's vital to maintain data integrity in the DM. It proposes a distributed
machine-learned ness initiates data integrity checking approach to verify that the training data is
correct. To begin, it recommends using a Provable Data Possession (PDP) selection checking approach
to guarantee data integrity. As a consequence, the DML-DIV strategy will be able to withstand
manipulation and fraud attacks. Second, as part of the TPA verification procedure, researchers
generate a unique integer known as the blinded variable and utilize the discrete logarithm problem
(DLP) to build proof and ensure data security. It uses two-step authentication and identitybased
cryptographic key generation technology to activate the data possessor's public/private pair of keys.
As a result, our DML-DIV method may be able to address the important escrow issue while also
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
65 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
cutting document maintenance costs. Lastly, Finally, a thorough theoretical examination is carried out,
with formal theoretical analysis and practical evidence confirming the DML-DIV system's safety and
efficacy.
Deep learning is currently an interesting topic in machine learning and there are many benefits
associated with Convolutional Neural Networks (CNN). A wide range of computer vision tasks have
been successfully completed by CNNs trained with deep learning algorithms. A CNN has shown good
performance in many areas, such as image processing, classification with the continuous development
of deep learning technology. CNN has recently received awards from image recognition and
classification competitions, providing good results compared to other networks. We summarize the
various CNN approaches that have been used to classify images. Furthermore, we focus on the optimal
configuration of these deep learning approaches according to the quality of the overall result. The
review concludes by describing the challenges of deep learning in image classification as well as a
future direction of research. The evaluation shows that deep learning is likely to remain the dominant
approach to image classification.
Green and blue spaces are fundamental for urban settlements to maintain the ecosystem quality.
However, public green spaces are crucial in enhancing the quality of life of citizens. Rapid
urbanization has imposed tremendous pressure on available land resources and led to the
encroachment of existing open and green spaces within and around cities. Consequently, the per capita
green in cities is reducing across the globe and pressure on public green spaces has increased. Most
developing cities are unable to fulfil the green space norms defined by their own. The study derives
the per-capita space requirement for publicly accessible green for million-plus cities in India. Further
analyses the per capita availability of public green space to assess the service level gap in Lucknow
city. The results show that the areas with higher density have lesser per capita share, whereas areas
with lower density have comparatively higher per capita public green space.
U-slot patch antenna design and implementation are discussed in this paper for 5.5GHz WLAN use.
The VSWR and S11 of this suggested construction, which is based on FDTD techniques to attain the
desired specification, are computed using the Computer Simulation Technology (CST) microwave
studio. The maximum bandwidth while utilizing coaxial feed is 260 MHz, which corresponds to the
WLAN frequency range of 5.36-5.62 GHz, and at its center resonant frequency, the gain is 5.3 dB.
This antenna is designed to be used in conjunction with the coaxial feed antenna. In order to obtain a
stable VSWR and low return loss, a frequency band adjacent to the present system must be used.
Pedestrian identification is an inexhaustible and sufficiently large task in any hyper intelligent
videotape monitoring, as it supports abecedarian information for a more in-depth understanding of the
videotape footage. Because of the possibility of perfecting safety systems, it contains an egregious
extension to automotive operations. This is available as an ADAS option from a number of
automakers. The pedestrian identification network was trained using images of pedestrians and
nonpedestrians. The trainPedNet.m coadjutor script is used to train this network in Computer Vision.
The sliding window method reduced the size of the image patches to (64*32). The patch dimensions
are derived from a heatmap that depicts the dispersion of pedestrians in the images in the data set. The
patch dimensions are derived from a heatmap that depicts the dispersion of pedestrians in the images
in the data set. It denotes the absence of pedestrians at various scales and locations in the images.
Patches of pedestrians closer to the camera are cut and processed in this illustration. Non-Maximal
Suppression (NMS) refers to the patches that have been obtained in order to combine them and display
entire pedestrians. The composition focuses on the achievement of the linear binary pattern (LBP)
abstract background fluctuations capturing and Histogram of Oriented Gradients (HOG) alternatives
with altered parameters to categorising is attained by Support vector machine Classifier in this
evaluation.
1Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
*Department of Bioinformatics, School of Life Sciences, Professor & Head, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
67 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
2Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
Salacia reticulata is an important medicinal plant, is widely distributed in some parts of the
subcontinent of India. The plant possesses bioactive compound salacinol which is proved to have
antitumor activity and is confirmed through various pharmaceutical studies. Apoptosis plays a key
role in the regulation of tissue homeostasis. Apoptosis, triggered by exogenous and endogenous
stimuli such as ultraviolet radiation, oxidative stress, and genotoxic chemicals is a crucial phenomenon
within biological systems. DNA damage activates and stabilizes p53 in the nucleus and cytoplasm and
regulates other proteins that stimulate intrinsic and extrinsic apoptotic pathways. Malfunctioning of
the apoptotic pathway may cause diseases like cancer, neurodegenerative and autoimmune disorders.
Recently, potent apoptosis inducing compounds associated with human health have been recorded that
prevent tumor promotion, progression, and the occurrence of cellular inflammatory responses. Certain
drugs are being employed in therapy to induce apoptosis for the treatment of cancer and non-cancerous
cells. The Inhibitors of Apoptosis (IAP) are a family of functionally and structurally related proteins,
which serve as endogenous inhibitors of programmed cell death. In the current study, salacinol was
analyzed and subjected to pharmacokinetics screening. An attempt was made to study the interaction
between three IAP proteins (BIRC5-3UIH, 3UII, 3UIK) with salacinol using Auto dock software.
Salacinol was found to have the best interaction with the IAP target protein.
1Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
*Department of Bioinformatics, School of Life Sciences, Professor & Head, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
2Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
3Department of Bioinformatics, School of Life Sciences, Research scholar, Vels Institute of Science,
Technology and Advanced Studies (VISTAS), Chennai, India.
The neurodegenerative diseases are highly fatal and they are characterized by the aggregation and
deposition of the misfolded prion protein (PrP) in the brain. The prion like prionoids leads to a variety
of neurodegenerative diseases in humans as well as in animals. Prion protein is active in the brain and
several other tissues which are made by receiving instructions from the PRNP gene. Prion diseases
are progressive, fatal, affect the structure of the brain or other neural tissue, and lack effective
treatment. Hence there is an urgent need to develop new and more effective therapeutic strategies to
combat these fatal diseases. The main objective of the current study is to identify mutated SNP and its
position which is responsible for the main cause of the disease. We have predicted the protein stability,
Amino acid function, Secondary structure of the amino acid, Mutated prion protein Homology
modelling, and analysis of Protein 3D structure. Through the literature survey, we have identified
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
68 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
phytochemical compounds from medicinal plants which possess pharmacological activities to cure
neurodegenerative disease. And we have also retrieved few currently used synthetic compounds which
are used for the treatment of neurodegenerative disease. Both the set of compounds were further
analysed for Molecular docking against the target prion protein. The docking results and comparative
docking studies reveal that the natural compounds exhibit the best binding energy than the synthetic
compounds. Natural compounds are more effective in the treatment and cure of various
Neurodegenerative diseases without any side effects.
Order Exchange and Migration Ant Colony System (OEMACS) and Ant Colony System OEMACS
approach based on ACS that finds solutions by combining order exchange and migration local search
strategies, was developed after examining the ant colony system's (ACS) promising performance for
combinatorial issues. The ACO algorithm, which is regarded as best approach solving for virtual
machine placement (VMP) problem, is capable of significantly reducing the number of active servers
from a optimization standpoint. These bio-inspired algorithms help in solving VMP problem. Using
the pheromone deposition method, artificial ants are guided to the feasible solution in ACO. It also
arranges virtual machines in a way that reduces resource waste. This strategy is used on servers with
homogeneous and heterogeneous VM sizes. The VMP is implemented using the ACO algorithm and
OEMACS, and a comparison is drawn between them that shows their efficiency in terms of execution
time and Energy Conserved
Now a day, low power and high-speed SRAMs have become the discriminatory part of many VLSI
chips. This is especially true for microchips, where on-chip reserve sizes are constantly evolving to
expand the growing diversity in processor speeds and Cache memory. SRAM (Static Remote Access
Memory) is used as fast cache memory and is used to speed up the processor allocation and visual
memory connector. In high-speed PCs, SRAM memory is essential for improving performance speed
and DRAM is used as part of Primary Memory where Crowding is more important than Speed.
Gas sensing ability of Thiophene with Carbonyl sulphide (COS) is investigated using hybrid
functional DFT B3LYP/6-31+G(d) level of theory. The interaction energy, the counterpoise corrected
energy and the charge transfer through Mulliken and Natural bond orbital ( NBO ) analysis between
the analyte and the monomer reveal the gas sensing parameter of thiophene. When carbonyl sulfide is
exposed to thiophene, it alters the electronic charge concentration which changes the electrical
properties of thiophene. This opens the possibility of thiophene as an efficient gas sensor. The results
are supported by UV-vis spectroscopic analysis . The reduction in the band gap for thiophene with
COS than that of thiophene enhances its electrical conductivity that makes it suitable in the design of
organic semiconducting devices. By COS adsorption on thiophene, the gas sensing ability is proved
which predicts thiophene as an excellent gas sensor to replace the traditional solid state sensor.
The Braille machines are expensive and as a result are not accessible to many. In particular, there is a
need for a portable text reader that is affordable and readily available to the blind community. The
concept of automatic document reader means blind reader is for visually impaired peoples. There are
millions of visually impaired peoples in the world. Reading is one of the major necessities of visually
impaired people. In this paper we designed system is a portable, low-cost, reading device made for
the blind people. Also overcomes the limitation of conventional Braille machine by making it
affordable for the common masses.
We proposes a smart reader for visually challenged people using raspberry pi. This system consists of
a camera interfaced with raspberry pi which accepts a page of printed text. This system uses OCR
technology to convert images into text and reads out the text by using Text-to-Speech conversion.
This system supports audio output via Speakers as well as headphone.
Weather forecasting is the prediction of what the atmosphere will be like in a specific place by using
technology and scientific knowledge to observe the weather. This paper aims to predict temperature
using linear regression model, random forest regression model and support vector regression model.
This study was limited to collecting and analyzing datasets that contained missing data, as the missing
data can immensely hamper the analysis. The data collected is incomplete and the temperature
prediction model is used to refine the incorrect and missing data. The random forest regression model
is used to predict the average temperature of that particular year we get the predicted temperature with
an accuracy of 99.58%.
Paddy is one of the major cultivated crops in India which is affected by various diseases at various
stages of its cultivation. Tomato is an a major crop in India that every year production is nearly 2744.32
thousand metric tonnes. It is very difficult for the farmers to manually identify these diseases
accurately with their knowledge.
Recent developments in Deep Learning show that Automatic Image Recognition systems using
Convolutional Neural Network (CNN) with Transfer Learning (TL) and Support Vector Machine
(SVM) models can be very beneficial in such problems. we have used Transfer Learning to develop
our deep learning model. The proposed CNN architecture is based on MobileNet and is trained and
tested on the dataset collected from fields and the internet.
The WSN (Wireless Sensor Network) based agricultural drainage management system is a
convergence technology to enhance agricultural production of crops from storm control, erosion
control and water table control. In addition, implementing smart agriculture, through the convergence
technology allows to determine the requirement of water resources, real-time monitoring of the field
and support farmers in decision process. In addition, sensors help in collecting information on
circumstances like level and flow of water in drainage area, soil moisture content and rainfall
condition. We presented the survey about the WSN based smart agriculture and its techniques to future
along future enhancement. The work further extends with the deep learning approach of analysing the
data collected from the level and flow sensors and camera. The CNN based design can improve the
performance of the system. The proposed ideation combines the swarm intelligence and CNN for
better performance.
Sign language is the primary language of the people with speech and hearing impairment. Hearing
impaired people use sign language to express themselves, participate in conversations, learn, and live
as normal a life as possible. When deaf and dumb persons try to converse in sign language with those
who aren't familiar with it, a problem occurs. This is where modern technology can step in. Although
many existing projects have proposed methods to alleviate the problem but most of these have used
external sensor or certain algorithms that do not work well under certain conditions like variation in
skin color, inclusion of facial data and similarity between few signs and gestures. In our project we
have used MediaPipe to solve the problem of variation in skin color as it is a very accurate hand
tracking framework by Google. We have also created 3 sets of customs datasets to train 3 different
deep learning models — 2 of these models are used specifically used for predicting particular groups
of letters which are similar to each other. This fixes the issue arising when similar signs are
encountered. The propose prototype can be used to help educate the elementary school children using
which they can learn to fingerspell the American sign language alphabets and string them into basic
words and learn them in a picturized manner. At the end our prototype should be able to detect the
sign alphabets from the live video, print them on screen and display the image of the words formed
using the sign alphabets.
Dr.A.Sarvanan
Associate professor
Department of Computer Science and engineering
M.Girish Reddy
Department of Computer Science and Engineering
Kalasalingam Academy of Research & Education
KrishsnanKovil, TamilNadu
G. Mahesh
Department of Computer Science and Engineering
Kalasalingam Academy of Research & Education
Krishanakovil, TamilNadu
Due to object detection’s close relationship with video analysis and image understanding, it has
attracted much research attention in recent years. Traditional object detection methods are built on
handcrafted features and shallow trainable architectures. Their performance easily stagnates by
constructing complex ensembles which combine multiple low-level image features with high-level
context from object detectors and scene classifiers. With the rapid development in deep learning, more
powerful tools, which are able to learn semantic, high-level, deeper features, are introduced to address
the problems existing in traditional architectures. In this paper, we propose a two-step solution to this
problem. In the first step, our goal is to provide a model to optimize memory usage and, in the second
step, we propose a multi-thread approach that uses YOLOv3 to perform real-time object detection on
multiple, concurrent, live streams on a single GPU. In this approach, GPU resources are optimally
used. The proposed approach is evaluated on a public dataset and the result shows improvements in
performance by an average of 12% in Central Processing Unit (CPU) usage and 13% in frames per
second (FPS) compared to the YOLOv3.
Code coverage represents the percentage of software code exercised by the test system. The
aforementioned “test system” is expected to include all tests designed to evaluate the quality of the
software code. Code coverage assessment is one of the most objective indicators that can accurately
illustrate the effectiveness of the tests in a project. Besides the primary intent to measure to test
effectiveness, coverage metrics data can be leveraged for additional purpose: improve test
effectiveness and/or to also boost test efficiency. Significant research and practical application of
repurposing the coverage metrics has been ongoing in the last few decades. The core of such
applications centers around Process and Software Quality enhancements. Such applications deploy a
variety of software tools and techniques, including static analysis tools(such as cppchecker, Coverity)
, data integration techniques (to combine data from software source control system, defect
management system and test antifactory) , business intelligence tools and techniques , and machine
learning algorithms to percolate undiscovered patterns. This paper reviews the landscape of such
applications and identifies opportunities for areas that warrant further research.
Skin cancer is one of the most common cancers that affects people all over the world. The three most
dangerous types of cancer that are caused by broken DNA and result in death. Damaged DNA causes
cells to expand uncontrollably, and the rate of growth is currently increasing rapidly. The
interpretation of these images is difficult due to the difficulties of the various shapes and sizes of the
lesions. One of the most difficult aspects of developing a good automatic categorization system is the
absence of large datasets. To distinguish the seven various types of moles in skin cancer, the suggested
method uses a deep convolutional neural network. The dataset, a large collection of dermartoscopic
images, was utilised in trials to increase performance using data augmantation techniques.
Melanocytic nevi (mv), Melanoma (mel), Benign keratosis-like lesions (bkl), Basal cell carcinoma
(bcc), Actinic keratoses (akiec), Vascular lesions (vas), and Dermatofibroma are the seven forms of
moles (df). The VGG algorithm is used to train and test the dataset images. The shown findings are
ideal for achieving high classification accuracy and lower false negatives when employed with the
DenseNet network. The models perform well in large dataset classification and can discriminate
between the seven categories of moles in a dataset.
The Covid-19 pandemic is causing a global health epidemic. The most powerful safety tool is to
wear a face mask in public places, schools, supermarkets to reduce the spread of Covid-19. There are
many Convolutional face recognition technologies to distinguish effective photographic imagery to
monitor face mask detection. Therefore, it is very important to improve the performance of existing
detection methods in the existing system. In the proposed input of the data set number increases to
improve the maximum range of accuracy. The proposed method is used to determine the body
temperature, face mask and social distance maintenance using advanced machine learning methods.
Using the EM -18 RFID scanner human data such as temperature value, face mask identification and
public distance detection are collected. It is used to indicate the state of a person's health in a cloud
platform. The wireless temperature sensor is used to detect the body temperature of a person using
MLX90614 without anyone. Raspberry Pi integrated with Raspberry pi camera is used to monitor face
mask detection and community distance. Raspberry pi captures an image and detects with the
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
74 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
Convolutional Neural Network algorithm if a person is not wearing a mask, not following a social
distance. So, the authorities have to monitor the human condition in the cloud platform. By applying
this concept, the spread of Covid-19 can be greatly reduced and it is easier to identify people with
Covid-19 symptoms.
Because of the growth of social media, writing comments or expressing thoughts on products online
is now simpler than ever. Data from user evaluations might be one of the most important sources for
anticipating vehicle sales.Sentiment Analysis is another way to understand if the user is satisfied with
the product which will help the manufacturer to improve the features in the upcoming release.User
reviews play a vital role in analysis and predict which product will have much production and sales in
future.In this paper a set of algorithms are used to predict the sentiment analysis including the Naive
Bayes,Logistic Regression and RandomForestClassifier. The categorization and prediction will be
based on user-defined reviews and data from Twitter.
Aathi Vasanthan V
Dept of computer science and Engineering
Sri Krishna college of technology
Coimbatore, India
Daraneeswaran M
Dept of computer science and Engineering
Sri Krishna college of technology
Coimbatore, India
Dharaneeish S
Matching is the process of collecting a young person's down and out enactment, accompanying
skillfully anticipated persons. It is a main stage superior to landing at a maintenance resolution.
Matching includes choices that concede the possibility to endlessly change a youth’s growth in an
adoptive classification. It is a blame usually pretended by a crew of artists loyal to the care and welfare
of youth, including psychologists, friendly traders, and jurists. Matching is a weighty and complex
task that grants permission to influence negative results for two people: an adoptive classification and
an adolescent if an inappropriate competition is created. This White Paper examines, by virtue of what
creative data processing can do, how it can considerably embellish the ratification process.
Specifically, what it will show is that there is a need for a very large size of culture in the corresponding
philosophy of a new order to mirror the complex process that happens through uniformly cruel
judgement and interpretation. When created and achieved correctly, creative equal electronics may be
very valuable, more conversant selections that bring about better effects and a sleeker and
understandable maintenance process. Using countenance treat science, the countenance in the face of
the adopting father and mother is written, and the kid whose equal is equate is recognized and assigned
to the ruling class.
Our research focuses on the issue of social media advertisement, which refers to the placement of
advertisements based on the social information and behaviours of individual users. As social network
services (such as Instagram, Facebook, and Twitter) become the primary venue for social interactions,
social network sites now account for more than 20% of all internet advertisement. The need of
advertisement is getting more and more important because of the competition that companies are
facing in their respective sector. We have done our analysis by understanding the individual
information with their behaviour on networking sites. We are presenting the analysis of outcome for
any advertisement data whereas our database consists of three parameters such as age, salary and
purchase or not. And we are predicting the outcome for other users. We have used and compared
various machine learning models and compared the accuracy of those models. For this research we
have used a dataset taken from the Kaggle website but this model can be used for any dataset so this
model can be used widely by anyone to get the result and to understand the behaviour of users. Prior
work that we have gone through is based on a click through model. Which predicts whether the user
will check or not but this model is focused on whether the user will purchase or not which is totally
based on the outcome of the advertisement. Our research will help the companies to understand the
behaviour of users and with the help of the data they can make changes to their product and
advertisement in order to accurately reach out their target audience which will help them a lot because
to reach their consumer and to expand the reach among the people is what any business is all about.
Social media as a medium of communication has opened countless possibilities for individuals around
the globe to express their opinions on various topics ranging from politics to entertainment, thus
reducing the gap in the accessibility of information. However, this has also led to social media
becoming a hub for spreading hateful messages. These virulent messages spread online result in the
rise of cases of cyberbullying, leaving an enduring impact upon the victims. Manually classifying and
reporting these messages is a challenging task and has therefore created an interest in the research
community to incorporate machine learning-based techniques to ease up the hand-operated process.
The study's goal is to play a small auxiliary role in the prevention and ultimate eradication of
cyberbullying. The proposed work in this research primarily focuses on the users from the Indian
subcontinent by experimenting with Code-Mixed Hindi-English language. The study achieves this by
performing the task of developing a Code-Mixed Hindi-English hate speech dataset containing 4014
tweets, out which 2000 tweet contain hate, using the publically available tweets from the Twitter
platform and, furthermore, utilising the created data to fine-tune a collection of pre-trained deep
learning models.
Traffic congestion is a serious problem of rising concern especially in India where the population is
already over a billion and the common choices of transport for commuting being a four wheeler and
a two wheeler. India is urbanizing at a great pace and it is competing with the fastest growing countries
in the world which also resulted in high vehicular growth. In order to tackle this some research has
been conducted on the existing methods and technologies for relieving traffic congestion and was
identified with a lot of improvement to make. Hence the main aim is to make it now intelligent enough
to take into consideration accidents/breakdowns, clearing way for ambulances and firetrucks and
better reliability of the existing system in detecting vehicles. Using the live feed from cameras with
image processing, deep learning and an algorithm with a timer logic for the signals, this project tackles
the issue.
From the olden days, we have been using the non-renewable resources like coal for our needs which
is leading to the exhausting of these resources. Technology has developed to such an extent that it has
become helpful for us in all aspects of life. By utilizing this technology we can use the renewable
energy resources and reduce the usage of nonrenewable resources for achieving a sustainable
development. The photo voltaic cells convert the solar energy into electrical energy and this energy is
stored in batteries to run the water pump during the day time. If a machine is to be switched off after
operating for few minutes, it becomes difficult and many times we don’t remember to turn off the
system after the prescribed time. Our project gives a solution for not only saving the energy but also
builds a brilliant framework to reduce the wastage of water and increment the beneficial of the product.
This paper endorse the idea of “Detecting Passive Attacks in Fingerprint Spoofing Using Convolution
Neural Network”. More recently, in the field of cybercrime getting fake fingerprints is a daunting task
in any developed country. Biometric authentication grows in many areas such as online banking,
private file locks, etc. Where fingerprint detection is an important factor used to obtain analysis of
fingerprints. By using Convolutional Neural Network Algorithm to detect the liveness of fingerprint
whether fingerprint is real or fake. This paper will explain the design and features of detection of
passive attacks in fingerprint spoofing using convolutional neural networks. Furthermore, we discuss
the major research challenges and future work that need to be addressed in this active field of
fingerprint liveness detection.
The symptoms of covid-19 and Pneumonia are similar. Steps must be taken to distinguish between
covid-19 and other types of pneumonia patients. In this paper a model of Convolutional Neural
network(CNN) is presented by using Tensorflow, keras, numpy and Matplotlib to detect covid-19,
Pneumonia, both covid-19 & Pneumonia and normal Patients. It is based on classification which is a
supervised learning. There are four classes, they are normal, covid-19, Pneumonia, both covid-19 &
Pneumonia. The paper is deployed by using by using the django framework in pycharm. It is a example
of chest x-ray image classification by using tensor flow, Matplotlib, keras and numpy library and
alexnet.
Shriya Gandreti
Electronics and Communication Engineering
Vardhaman College of Engineering Hyderabad, India
Automated control is a vast area of technology, whose prime objective is to build control strategies to
increase functioning capabilities and efficiency when they are used on a system. The remarkable
feature of automation is that it reduced the user’s workload. An example of those utilities is the
Automatic fan. Fans are generally designed with control equipments, based on speed demands.
Generally, when the heat is high, the fan is switched to rotate at a higher speed and at cooler or lower
surrounding temperatures, the fan will work at a slower speed, which is mostly done with the help of
a regulator. Therefore, in this paper, an automatic control design is presented for fan speed. A circuit
consisting of a temperature sensor along with a microcontroller inside, a DC motor, and some
electronic components is used and implemented to automatically change the speed of the fan. As an
extra feature, the LCD screen is also placed which is used to display the temperature and fan speed at
a particular moment. When the temperature of the detected environment exceeds the threshold value,
the fan starts up, and the temperature drops. The fan will remain on until the temperature drops below
the threshold value. Automation of fan speed saves time and maintains an always comfortable
environment.
Implementing blockchain techniques has enabled secure smart trading in many realms including
neighboring energy trading. The information stored on the blockchain will face privacy security issues
over attackers. In this paper, a Smart contract based blockchain-oriented approach to solve the problem
of privacy leakage without restricting trading functions in smart grid is presented. The proposed
approach mainly addresses energy trading users' privacy in smart grid and screens the distribution of
energy sale of sellers deriving from the fact that various energy trading volumes can be mined to detect
its relationships with other information, such as physical location and energy usage. Then for the
purpose of secure data transmission, Conviction Diffie Hellman Algorithm (CDHA) was used for
generating the keys. Finally for detecting the untrusted user, Trusted Gaming Token Honeypot
Algorithm (TGTHA) was suggested. The whole experimentation was carried out in a MATLAB
environment. Experimental evaluations have demonstrated the effectiveness of the proposed
approach.
Insurance fraud is an illegal activity that is deliberately done for financial gain. In the present era, this
is the prime severe problem encountered by various insurance companies all over the globe. In most
cases, some shallow or deep holes in process of fraudulent claims investigation have been identified
as a major cause. Due to this reason, the need of using computer techniques to curb fraud activities
grew as a motivation, providing not only a reliable and robust environment for customers but also
reducing fraud claims to a large scale. We presented our research by automating the assessment
process of insurance claims through various data techniques, where identification of false claims will
be automatized by utilizing Data Analytics and Machine Learning methods. Moreover, the system has
the ability to potentially develop heuristics around fraud indicators. Therefore, this model creates a
positive impact on the whole insurance industry with increased company credibility as well as
customer satisfaction.
Phishing is a cybercrime that involves the use of virtual networks. Phishing is used to attain nefarious
goals, such as stealing money and personal information from internet users. To perform such tasks,
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
80 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
phishers use emails or SMS as bait. The rate of such crimes is rising all the time. It's essential to realize
and be informed of such a crime. Donation camps have begun to support Russia and Ukraine as a
result of the ongoing hostilities. To steal this money, scammers have established harmful websites.
They're sending out emails with these kinds of website links in them. This study outlines the recent
phishing attempts, how to protect oneself from phishing and the email patterns used by such criminals.
Machine learning algorithms are used to distinguish between phishing and authentic websites. The
accuracy of test set prediction was taken after fitting model to the training data. The Logistic
Regression, SVM, and Naïve Bayes Algorithms were outperformed by the KNN and Random Forest
Algorithms. KNN and Random Forest provided 91% and 91.96% accuracy, respectively.
1Department of Computer Science and Engineering, School of Computing, SRM institute of Science and
Technology,Kattankulathur,Chengalpattu-603203,India
Nowadays, unpredictable climate change has led to poor yields of the crops affecting their
performance and growth .Crop prediction performed in advance of the harvest, would help the farmers
adopt appropriate measures, in terms of storage, etc. It will also be advantageous for the government,
policymakers, etc. This project will help counsel the farmer in sowing reasonable crops by deploying
machine learning techniques like Ensemble learning, one of the best technologies in crop prediction.
Machine learning will help decide what crops to grow, what to do during the growing season of the
crops, after harvesting, etc. Factors like temperature, rainfall, area, etc.will be considered. Different
machine learning algorithms will be applied to support crop yield prediction research.The predictions
achieved by this system will largely help the farmers decide which crop to grow. The accuracy of
ensemble prediction is 98.9 while that of gradient boosting is 99.45.
In the realm of data mining strategies, a massive amount of computerized data is produced using a
variety of methods. An important area of education data mining development is the establishment of
students achievements predictions modelss to forecast student performance in academic institutions.
Using their prior semester grades, a prediction system has been presented. Binomial logical regression,
Decision tree, linear regression, and the KNNs classifier are used to analyze the study. This framework
would aid the student in recognizing their finals grade and improving theirs academic conduct in
orders to achieves their higher score. When a student's gradesfalls below 50%, our app sends a
message to their parents.
Unique Atomically slight Molybdenum disulfide (MoS2) is a semiconductor material suitable for
field-effect transistors (FETs) with channel lengths of tens of microns or less than ten nanometers.
The bulk and massive band hole of MoS2 limit the level of difficulty possible in direct source-drain
in extremely short-channel semiconductors. Its molecularly slim body improves the efficacy of door
balance. Our results show that when the thickness of the MoS2 channel layer is increased, it plays a
significant role in settling and executing debasement.
Vivek Bhambri
The growing size of data bases in all types of organizations is making it difficult for them to analyze
it and use it for making effective decisions well in time. In such a scenario, where making effective
and timely decisions is of utmost importance, the techniques and tools available in data mining has
proved to be an asset for the organizations. Data mining techniques are used in all types of
organizations for customer relationship management, detection of frauds and predicting future trends.
But still it is in a stage of infancy, where implementation of these techniques has to face economic,
administrative and behavioural problems. Readiness to adopt the new technology is a major issue in
the implementation of new technologies. This paper tries to explore the relationship of age and gender
with the readiness to adopt the data mining techniques in the banks with the help of association rule
mining. The analysis of the results will be fruitful for the decision makers in the banking sector to
design a strategy for the successful implementation of these techniques.
In the system, technologies have been demonstrated to make individual’s lives more secure and safe
every day. The proposal is developed on cutting-edge GPS technology and Internet of Things (IoT)
and employs an application to manage all the college buses, enabling students to track the movement
of buses. Additionally, daily issues such as traffic, abrupt delays, and faulty vehicle arrival and
departure incidents tend to happen, interrupting the students' and faculty’s schedules and requiring
them to wait for their particular bus arrival or otherwise attempting to miss their bus. The application
allows all of an institution's staff and students to track where each college bus is at any given time. A
GPS module has to be installed in every bus that is helpful in assisting users to locate the bus, and the
data is collected via an Android app that uses Google Maps to track each bus's travel. The location
coordinates of bus are updated every second in the application as per the current location of the bus,
paving the way for a real-time system
Krishnankovil, Tamilnadu
G.Gangadhar
Department of computer science and engineering
Kalasalingam academy of research and education
Krishnankovil, Tamilnadu
Dr.Mohad Usama
Associate professor
Department of computer science and engineering
Kalasalingam academy of research and education Krishnankovil, Tamilnadu
Social network, e-commerce sites, blogs are new emerging platforms for people to express their
opinion. These websites provide a large volume of text that can be utilized for a variety of purposes,
including sentiment analysis. The major purpose of sentiment anal ysis is to aid in the improvement
of a firm. Here NPL algorithm is used. In proposed system, NLP algorithm shows outstanding
performance. To create sentiment analysis a using the analysis of emotions, there is a need to use
polarity obtained through the reviews and finally we shown the graph based on reviews and
comparing two products reviews using natural language processing.
As technologies are enhancing, human beings are habituating to virtual life and virtual verbal
exchange. There are numerous methods to communicate with others through the net in this
contemporary technology. Most people always select and use the easiest manner of communique
commonly i.e., electronic mail. Electronic mail is the era that allows customers to contact others via
sending mails and additionally enables in the business global conversation. There are folks who can't
use this generation due to the fact that they're illiterate or do not have the visible capability on the
screen. So, to make this era towards visually challenged human beings, a Voice-based totally email
gadget is proposed by using Artificial Intelligence and Python. This device gives visually challenged
people the power of communication and makes them a great deal stronger and more unbiased. This
software will assist blind people to get the right of entry to e-mail much like different everyday
humans. Voice-primarily based e-mail structures use new technology as a way to be without difficulty
proper through visually challenged people.
Diabetes is a disease caused by elevated blood sugar levels in the body. Diabetes shouldn't really be
overlooked. If left untreated, it can cause serious complications such as heart disease, kidney disease,
high blood pressure, loss of vision, and damage to other organs in the body. Early detection of diabetes
can be treated. To achieve this goal, we use a variety of machine learning techniques to perform early
predictions of diabetes in the human body or patients for greater accuracy. Machine Learning
Techniques You can improve predictions by building models from patient datasets. Given a dataset,
this study uses machine learning classification and ensemble strategies to predict diabetes. K Nearest
Neighbor (KNN), Logistic Regression (LR), Decision Tree (DT), Support Vector Machine (SVM),
Gradient Boosting (GB), and Random Forest are abbreviations for K Nearest Neighbor (KNN),
Logistic Regression (LR). Decision Tree (DT), Support Vector Machine (SVM), Gradient Boosting
(GB), or Random Forest (RF). Compared to other process, the outcome of each model is distinguish.
Project work gives an precise or more accurate model that gives that the model can precisely predict
diabetes. Our results show that Random Forest is dominating to other artificial algorithms in terms of
accuracy.
Cloud computing has a number of security issues, with the SAND theft attack being one of the most
significant. Existing security measures, like as encryption and decryption, are ineffective against
insider SAND theft. This study weaves a web of malicious fake expertise to prevent insider data theft
attacks. The approach is demonstrated by creating an example product based on a web blueprint that
demonstrates the usage of decoy technology. In addition to spreading disinformation through decoy
numbers, this importance puts doubt on illegal access and presents problematic considerations. As a
result, insider theft may be averted by using the Received Signal Strength Indicator(RSSI) to measure
the power received from the receiver’s returned signal.
Recent advances in deep learning have led to an increased interest in image captioning. A caption for
an image should adequately describe the image and provide a concise description. Moreover, the
generated captions should be syntactically and semantically correct. To achieve this goal numerous
architecture and techniques have been used. The baseline architecture for captioning contains an
encoder and decoder as its components. Where Convolutional Neural Network (CNN) is tested and
trained for extracting features(encoder) from the image and Long Short-Term Memory (LSTM) is for
generating the captions(decoder). In this study, we briefly discuss the methods and architectures which
are successful and efficient in recent years. MSCOCO, Flickr30k, and Flickr8k are the prominent
datasets for captioning and are widely used. To test methods quantitatively and qualitatively various
evaluation metrics have been used. Based on the resultant score of methods on evaluation metrics we
learn and compare the efficiency of those methods in this study.
In contrast to the past, advancements in computer and communication technologies have resulted in
broad and rapid transformations. People, organizations, and governments all benefit from new
inventions, yet some people, organizations, and governments are harmed . For example, security of
important data, the security of stored information , and the accessibility of the data, among other
things. Digital fear is one of the most critical challenges in today's world, based on these difficulties.
Digital apprehension, which has caused a slew of concerns for individuals and organizations, has
reached a point where it might jeopardize open and national security by many groups, including
criminal organizations, Intrusion Detection Systems (IDS) were developed in this vein to keep a
strategic distance from digital attacks. Currently, support vector machine computations were used to
detect port sweep initiatives based on the new CICIDS2017
In the this paper we use the ensembled based hybrid classification which can enhance the better
detection rate since here we use weak and strong classifiers
In recent times, the influence of cloud over every single individual as well as over enterprises is quite
evident. As much as it eased the work of various IT firms in providing access to the data, an
exponential rise in the security threat of the data has also been increased simultaneously. The chances
of data loss and other such issues arise with shifting to cloud and there is a simultaneous need to tackle
such issues. This paper is a literature survey of different security mitigation techniques used for clouds
by various researchers. As much the world is dependent on the cloud, there is an equal increase in
potential threat to the data on cloud. Different types of attacks tend to harm the critical data of cloud.
Various researches have proposed different mitigation techniques to the possible threats to the cloud.
Latest of all, one of the research projects proposed the use of blockchain to mitigate security threat to
cloud.
It is impossible to manufacture the blood, as it can be given by the donors. Blood bank retrieval
information can be given through the Android studio application, but there is not much work on the
integrated environment like IoT sensor connected with Android studio application development. This
paper provides the IoT health care sensors connected to the Android studio mobile application
development blood donors and blood receivers. The mobile application is most useful in an emergency
during the COVID-19 pandemic. This observational study gives the web-based application
development and also Android-studio mobile application development for blood bank information
retrieval system. The results are carried out in a real-time environment and updated features of the
blood bank mobile application.
In recent years, using a computer in a virtual environment has attracted the interest of researchers.
This paper presents an application that allows gadgets to be more interactive and functional with little
or no physical interaction. To interface with the system, the program provides voice gesture
recognition and hand gesture recognition functions. The interactive system begins with the user being
greeted by a voice assistant named "Proton." The assistant uses the user's input to accomplish activities
like as search, file navigation, date and time, and to start and stop the hand gesture recognition system.
A camera records a live video stream in a Hand Gesture Recognition system, from which the input is
collected via an interface. The system has been programmed to recognize a variety of hand movements
that may be used to do operations such as right-clicking, left- clicking, opening a file, and so on. Our
system detects the coordinates on the hand and recognizes the form and motion when the user holds
their hand in front of the camera. This is accomplished through the use of the blazing palm detector
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
87 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
model and the hand landmark model. In previous systems, data gloves or markers were used to input
data into the system. There are no such limitations in this system. In front of the camera, the user may
intuitively make hand motions. Hand gesture recognition systems that are totally reliable are currently
being researched and developed. The created system acts as the basis for future work that may be
expanded.
Accidents have been a leading cause of mortality around the globe. In many situations, injuries are
claimed as a result of street consumers' irresponsibility and being stuck in remote locations.
Additionally, the great majority of persons around the accident site are concerned with snapping
pictures and films, completely unaware that their inattention might cost a life. This demonstrates your
society's insensitivity. The goal is to develop a system that can identify an accident using a live video
feed from the CCTV camera mounted on a roadway. The idea is to run each frame of a video through
a quanvolutional neural network model that has been trained to classify video frames as either an
accident or not. Furthermore, it will assist in identifying accident prone locations and alerting vehicles
to the accident prone zones ahead of them. Quanvolutional Neural Networks have shown to be a
quicker and more accurate method of picture classification. When compared to other image classifying
algorithms, QNN-based image classifiers achieve accuracy of more than 94 percent or higher for
datasets and need less preprocessing. When compared to only standard CNNs, QNN models displayed
higher test set accuracy and quicker training times.
we are going to talk about multiple machine learning algorithms that are used to predict if a person
has a heart disease or not.
P. Sangeetha
Department of Information Technology
SRM Valliammai Engineering College
Chennai, India.
U. Shajitha Banu
Department of Information Technology
SRM Valliammai Engineering College
Chennai, India.
K. Saranya
Department of Information
Technology SRM Valliammai
Engineering College Chennai, India.
P. Saranya
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
89 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
This paper proposes about an AI-based people security system that aims to protect people who are in
trouble. In a critical situation, this system can respond correctly both automatically and manually. To
accurately monitor the victim's status, the proposed system includes a Gesture, Speech, Violation
detection and location share with help of GPS. The collected data is processed using a python and
MediaPipe, and the protective action is done depending on the severity of the situation. The victim's
location is reported to the appropriate authority as part of the protection system's request for rescue
action. And alert will be generated.
A high speed fully homomorphic encryption system is intended as a key cryptographic tool for
developing a reliable and secure cloud computing environment, as it allows arbitrary evaluation of a
ciphertext without revealing the plaintext. However, existing encryption implementations stay
unrealistic due to very elevated time and resource costs. This paper presents the design of a power and
area efficient high speed 768 000-bit multiplier, based on Fast Fourier Transform multiplication for a
fully homomorphic encryption operation. By implementing a specific prime as the base for the finite
field, the radix-16 calculations were simplified to requiring only sum and shifting operations. A two
stage carry look ahead system was employed to determine carry and obtain multiplications result. The
multiplier design was implemented and verified by Verilog HDL and simulated by Modelsim 6.4 c
and MATLAB Tool. The Performance was measured by Xilinx tool synthesis Method.
accuracy, it is believed, would have a considerable cost impact on enterprises competing in highly
competitive power markets. We will use a Deep learning algorithm named Improved in our project to
estimate power consumption. We can obtain accurate future predicted output by utilising improved
hybrid ARIMA with LSTM.
Detection of abandoned and stationary objects like luggage’s, boxes and machineries etc. in public
places is one of the challenging and critical tasks in video surveillance system. These objects may
contain weapons, bombs or other explosive materials that possess threat to public. Though various
applications have been developed to detect the stationary objects various challenges like occlusions,
change in geometrical features of objects etc. are still to be addressed. By considering the complexity
of scenarios in public places and variety of objects a context aware model is developed based on Mask
Region-Based Convolution Network (M-RCNN) for detecting the abandoned objects. A modified
convolution operation is implemented in the Backbone network to understand features from geometric
variations near objects. This modified operation layers can be adapted based on the geometric
variations in order to extract required features. Finally, a bounding box operation is performed to
locate the abandoned object and masking the particular object. Experiments have been performed on
the bench mark dataset like ABODA, which shows that a mAP of 0.6948% is achieved. An ablation
analysis has also been performed and a compared with other state of art methods. Proposed model
performed well in detecting the abandoned objects compared to existing state of art methods.
Plants have a significant role in reducing air pollution by absorbing the pollutant gases, absorbing
carbon dioxide, and releasing the oxygen that human beings can breathe. During day-to-day activities,
planting is reduced because of improper monitoring, and most people still use the physical method for
passing water to the plants. A proper irrigation system helps the plants grow well and prevents them
from the improper water supply that can cause adverse effects, leading to poor crop development. The
autonomous home gardening system uses IoT water conservation by providing water based on the
needs of the plants without any human resources. Node MCU and various sensors are used to monitor
the plants automatically. The sensors give information about the soil moisture and temperature content
connected to node MCU. It analyzes the parameter and passes the water to the plant without the
physical presence of humans. The information can be sent to mobile devices by using the Android
application.
Department of mechanical engineering, Mepco schlenk engineering college, Sivakasi-626005, Tamilnadu, India
Department of mechanical engineering, Mepco schlenk engineering college, Sivakasi-626005, Tamilnadu, India
Department of mechanical engineering, Mepco schlenk engineering college, Sivakasi-626005, Tamilnadu, India
The fireworks flash powder composition containing aluminium, sulphur and potassium nitrate are very
sensitivity at room temperature. This paper suggests that the aluminium powder is replaced by
biodiesel coated dextrin powder to reduce the sensitivity of the existing flash powder. Open burning
tests were conducted to the newly synthesized flash powder and compared with the existing flash
powder mixture. The thermal impact sensitivity tests are carried out for both the existing and the newly
synthesized flash powder mixtures at temperatures 35°C, 40°C and 45°C. From the thermal impact
sensitivity results, the flash powder mixture having 20% of S, 57% of KNO3, 16.1% of Al, and 6.9%
of biodiesel coated dextrin powder is very sensitive at 40°C and 45°C.
Groundwater quality at any location depends on the mutual possessions of several progressions beside
the subsurface flow path. Perceptive of natural history and degree of infectivity in particular region
involves absolute hydro-chemical statistics. In order to assess the groundwater chemistry and its
appropriateness for consumption purpose, sixty three subsurface water samples were analyzed for
evaluating to the standard values. Based on perceptive of the hydro-geological and groundwater
environment, the chemical characteristics of the groundwater were evaluated. The favored parameters
for the quality assessment are major anions and cations along with pH, turbidity, total dissolved solids,
total hardness, fluoride, and iron as trace metal. Total dissolved solids distribution, hydrochemical
facies, Piper diagram, factor analysis, correlation studies and cluster analysis were carried out to
evaluate the study zone. The physical parameter total dissolved solids (TDS) was clustered
independently. The assessment concludes that the groundwater of the Tirupur region is critically
deteriorated by different anthropogenic activities.
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
92 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
Machine learning has had a significant impact on image recognition, product recommendation, clinical
diagnosis, and nearly every other field of technology. Every aspect of our life is surrounded by
machine learning algorithms that help to improve security, public safety, medicine, transportation, and
so on. Because of the growth in urbanization and the volatility of property values, there is a greater
demand for a system that predicts property prices. Real estate price prediction can assist in resolving
this issue and forecasting house prices so that customers can examine them. This paper reflects the
effort made to solve the aforementioned challenge. A comparison of the use of existing machine
learning algorithms is conducted, proof of which method is best suited for this task is supplied, and
the prediction engine is developed for real-world use by users.
183. TIME DELAY NEURAL NETWORK ANALYSIS FOR LIP READING - NEURAL
MACHINE TRANSLATION
Sangeetha R1 and Malathi D2
1,2 SRM Institute of Science and Technology Kattankulathur, Chennai
Lip-reading used to educate deaf and hard of hearing individuals to talk and communicate successfully
with other people for hundreds of years. Language content may be obtained through Lip Reading by
studying the speaker's lip shape and movement. The ability to lip-read helps deaf individuals
comprehend what others communicate. The speaker's subtitles are obtained by taking a video of
converting Hindi language to English language, importing it into the suggested model. To get reliable
results, users might employ deep learning technology to extract a vast number of various
characteristics. Our proposed approach uses sequence-to-sequence architectures built for (NMT)
Neural Machine Translation and audio speech recognition. To automatically learn nonlinear decision
surfaces, the Time-Delay Neural Network (TDNN) employs error back-propagation to construct a
three-layer hierarchy, allowing the network to discover sequences. The paper presented a TDNN
approach to lip recognition that possesses both of these essential properties. The suggested model
consists of three stages: Prepossessed, encoding, and decoding. As a result, it 1) introduces a unique
approach for inter-modality processing (before separate moralities acquire characteristics) and 2)
expands the previously suggested cross-connections. Our findings proved that a TDNN is the best
approach for predicting acoustics from sensor data. Our unique process combines the findings of visual
and audio speech to remedy the observed gaps. By lowering the word mistake rate the TDNN achieved
a detection accuracy of 98 percent after evaluating accuracy from speakers.
Department of Master of Computer Application Hindustan Institute of Technology and Science, Chennai
603103, India
People have a strong desire to live a comfortable life free of physical labour. The Internet serves as
the backbone of all technologies, providing a very stable platform for any web- based product. The
Vehicle Service center Website and Mobile Application is a significant advancement in the field of
service centers. The goal of this project is to automate the overall process for the garage owner,
mechanic, and user by identifying the different aspects that affect the service and maintenance of autos
for everyone in order to reduce the time required for it. The project paper on 'Design Website and
Mobile Application for Vehicle Service Center' is available here. Vehicle owners can use an app like
this to communicate with the service center that does the work. Any vehicle user can utilize these two
programs, an android app and a website, at their leisure. The proposed solution is intended to give the
service center owner as much assistance as feasible. This method will aid the owner in keeping track
of the service center's general flow, including the exchange of replacement parts and money. We're
building this with user-friendliness, informativeness, and time savings in mind, but only when the user
registers with the necessary information.
On account of the uncontrolled and quick growth of cells, Brain Tumor (BT) occurs. It may bring
about death if not treated at an early phase. Brain Tumor Detection (BTD) has turned out to be a
propitious research field in the current decennia. Precise segmentation along with classification
sustains to be a difficult task in spite of several important efforts and propitious results in this field.
The main complexity of BTD emerges from the change in tumor location, shape, along with size.
Providing detailed literature on BTD via Magnetic Resonance Imaging (MRI) utilizing Machine
Learning (ML) methods to aid the researchers is the goal of this review. Diverse datasets are
mentioned which are utilized most often in the surveyed articles as a prime source of Brain Disease
(BD) data. Furthermore, a concise epitome of diverse segmentation methods that are utilized in
diagnosing BDs has been offered. Lastly, an outline of key outcomes from the surveyed articles is
exhibited, and several main problems related to ML-centered BD diagnostic methodologies are
elucidated. The most precise method to detect diverse BDs can be engaged for future advancement
via this study.
The eye is considered as most sensitive organ in human body. The people who are suffering with
Diabetics may get affected with Diabetic Retinopathy. It is required that classification diabetic
retinopathy with the best technologies and methodologies. Artificial intelligence is having its vast
applications in various sectors. Due to its ability to perceive the problems, developing the appropriate
reasons for that, deep learning can act as a great aid in addressing the severity of the disease. This
project provide a brief overview of the application of convolutional neural network, and highlights the
various methods available for the detection of disease of diabetic retinopathy on basis of severity.
Edge servers installed at base positions provide highly available figuring and storing data to
neighboring app handlers in an edge computing (EC) setting. From the standpoint of the app vendor,
reserving information on edge servers can shorten the period it takes for app users to retrieve
information. An edge server, on the other hand, usually has inadequate information due to its small
scope. By solving the collaborative caching tricky in the EC environment, the purpose of this study is
to reduce system expenses such as facts caching, information migration, and many more. The
collaborative edge data caching issue (CEDC) is an NP-complete problem with a constrained
optimization statement. OCEDC is an operational algorithm for solving the CEDC problem in all time
slots that has been suggested. OCEDC is based on Lyapunov boost and provides verifiable nearoptimal
results while operating online without the need for future data. OCEDC is put to the test on a real-
world dataset, and the findings show that it outdoes quatern sampling alternatives by a significant
margin.
Flash powder is a chemical mixture used in the fireworks industry that is highly sensitive in nature.
According to the Petroleum and Explosives Safety Organization's (PESO) guidelines, fireworks waste
should not be stored or accumulated, thus a large pit is dug and all of the debris is burned on the same
day. A solid inertant mono-ammonium phosphate chemical is utilised as a fire extinguishing agent
and to lower the flash powder's sensitivity. The tests were conducted using a mixture of flash powder
and mono-ammonium phosphate in various proportions. It is found that as the amount of inertant
increase in the sample impact due to height increases and friction sensitivity decreases make the
sample in-sensitive and for the layer ignition temperature in the composition of 75% of
monoammonium phosphate and 25% flash powder the sample forms into a lump and colour change
is observed this indicates the sample becomes in-sensitive.
The increasing inclination towards electric vehicles over the last periods is due to various factors. The
motors used in electric vehicles are substantially different from those used in other applications. The
motor in EV applications necessitate excellent efficiency, torque density, reliability, high power
density and high speed, This paper reviews different electrical motor for EV propulsion applications.
A comparative analysis of the DC motor, induction motor, switching reluctance motor, and permanent
magnet synchronous motor is performed to evaluate the best suitable electric motor drives for electric
vehicle applications based on efficiency, power density, cost, maximum speed, torque ripple, range
and fault tolerance. A detailed review is presented on recent existing motors which include axial flux
motors, Flux switching permanent magnet motor, surface mount and interior permanent magnet
synchronous motor. In addition, overviews of control, optimization algorithms and evaluation of
performance for EV electric motor drives are provided. Permanent magnet synchronous motor has
been preferred choice in electric vehicles, according to the review.
Globally, irrigation is scheduled according to crop visual inspection by farmers and as a result, about
50% of water is wasted by traditional irrigation systems. Sprinkle irrigation, drip irrigation, and furrow
irrigation are examples of controlled irrigation methods that decrease water wastage by 30 – 70%.
These systems, however, fail to hold precise water in the soil owing to their open structure, which
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
96 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
affects the quality and number of plants by irrigating less or dramatically reducing soil nutritive.
Therefore, there’s a desire for feedback on integrated precision irrigation practices to efficiently utilize
water without harming the development of crops. Precision irrigation takes soil moisture, climate
information, and crop type to estimate water is required or not. If therefore reduces the cost of farm
workers. The proposed system uses a hybrid random forest with a linear model (HRFLM) for
prediction work. For the hybrid random forest and linear models, we employed an ensemble voting
classifier. Due to the architecture of the hybrid algorithm, we achieved accuracy for prediction. To get
more than 96% of accuracy.
Based on the application type, a wireless sensor network would be a heterogeneous type. The energy
consumption is one of the major issues for WSNs. The overall energy conservation of WSNs would
be reduced by the existing communication protocols. The network is partitioned into the clusters using
the low-energy adaptive clustering hierarchy (LEACH), which is a cluster-based protocol that chooses
a few sensor nodes randomly as cluster heads (CHs) according to the generation of random numbers
in each sensor node. The CHs role rotates for even distribution of energy load among sensor nodes of
a network. The improved version of LEACH protocol has been proposed to achieve the energyefficient
and stable CH selection. The random number is generated using a proposed work based on the
inclusion of different parameters like average residual energy (ARE) and CH coverage (CHC). The
chosen CHs would have more neighbours in the coverage circle by using the CH coverage parameter
(CHC) that reduces the energy consumption by member nodes towards reaching the CH. The higher
energy should have included in the selected CHs that ensures by the average residual energy (ARE).
The multi-objective selection parameters have been improved the Particle Swarm Optimizer (PSO)’s
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
97 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
fitness function to enhance the selection of a relay node and energy efficiency during the phase of data
transmission. To carry out the relay selection, the proposed enhanced-PSO algorithm is considered
the parameters like Average Energy Load (AEL), Link Error Rate (LER), and Traffic Index (TI).
Based on the analysis of simulation results, the proposed technique achieves increased performance
in terms of communication quality via dynamic and static scenarios, network lifetime, and energy
consumption.
To reduce consumption of energy, energy efficient smart street lighting system is implemented which
saves a lot of energy compared with conventional street lighting system. The main function of energy
efficient street lighting system is light will glow, if there is no light and no motion of vehicles and
human. Most of the countries using fluorescent lamps which consumes a lot of energy. In this work,
energy efficient smart street lighting system is proposed to save the energy by using light Emitting
Diode(LED), LDR sensor, Ultrasonic sensor driven by raspberry pi. By comparing the proposed street
light and conventional street light, there is huge difference in energy consumption. In this proposed
model, LDR sensor senses the intensity of light. ultrasonic sensor is used to detect the movements of
the object. Based on the LDR and Ultrasonic sensor output values, we can determine either led should
glow or not. From this proposed system, the energy usage drastically reduced.
Dr. M. Suchithra
Associate Professor (0.G) Department of Computing Technologies
Mrs. Mahalakshmi.P
Assistant Professor (0.G) Department of Networking and Communications
SRM Institute of Science and Technology
Parkinson’s disease (PD) is the second most preva- lent neurodegenerative disorder affecting more
than 10 million people globally. Being an incurable disease, its onset prediction and analysis is crucial.
Deep learning techniques have been pro- gressing significantly towards neuroimaging and other
medical analyses. In this study, we leverage the use of various Convolution Neural Network models
such as 2D-CNN, VGG16, ResNet50 and LeNet-5 to classify the intricate functional Magnetic
Resonance Imaging(fMRI) scans for distinguishing the Parkinson’s Disease affected brains from
healthy ones. By achieving the highest accu- racy of 99.70%, this endeavour concluded that CNN
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
98 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
architectures have the prospect to draw out extensive discerning features and novel biomarkers from
complex clinical data and therefore has the competence to be beneficially utilized to a greater extent
in more advanced systems.
Elective recommendation systems have become an essential technology in the field of higher
education in today’s world. The spectrum of subjects and technologies included in today’s education
system has increased drastically [1] [2]. Over the span of a century, courses and subjects have
penetrated their way in and out of an educational institute’s curriculum. The aim of this system is to
help students make an informed decision about their electives through the use of machine learning
algorithms and historical data. [4]In this model, we use ALS Implicit Collaborative Filtering and
LSTM network to put in place an effective structure that will provide recommendations based on the
student's interest, rating, and historical data. The system allows the students to prioritize one category
of rating over the other based on their interests. This enhances the system’s performance by ensuring
that the subjects that have a higher average rating are being given preference.
IoT is an escalating trend in today’s world and has proved to be a game-changer in the field of
technology. There is a high need for security systems in our everyday life. For example, security in a
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
99 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
business space, an organization is important now. Currently, security cameras are being used in order
to develop secure places in the company. Sensors and devices are used to develop new systems to
overcome existing security issues. Lately, there are many security systems, which make use of various
motion sensors to detect any motion and notify the owner. However, most of these systems do not
provide the features of remote camera surveillance, power efficiency, advanced security combined
with ease of use. The main aim of this paper is to enhance the traditional security system and overcome
all these problems by developing a smart security and surveillance system that makes use of multiple
sensors, provides a warning to the person who has intentionally or unintentionally entered the
company. The main advantage of the system is the ability to remotely manage the organization 24/7.
We aim to design lightweight, low-cost, extensible, flexible, smart security systems using IoT which
employs the integration of various latest technologies that can be used to control a system in an
organization. All these features combined create a reliable security system.
In this paper, the load carrying capacity of reinforced hollow block (Steel fibre) was analyzed by
conducting varies experiment like compression and impact test. The experiment was carried out by
varying the reinforced percentage (1%,2%&1% chopped) and different types of hollow block used
like hollow block, hollow mould block. The reinforced hollow block was manufactured under the
guidance of authorized hollow block manufactured. The steel fibres are randomly distributed along
with raw materials during the mixing process. After the curing process, the hollow block was tested
by using universal compression test equipment and concrete impact test setup. The results show that
the compression strength increased by 33.45 % and impact resistance improved up to 13.22% for the
2% steel fibre reinforced hollow mould block. The finite element analysis using Ansys explicit
dynamics also reflects the more or less equivalence result.
Shubhaam Agrrawal
Computing Technologies
SRM Institute of Science and Technology
Kattankulathur, India
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
100 Proceeding of International Conference on Contemporary Engineering and
Technology
May 21st – 22nd, 2022
Dr. C Santhanakrishnan
Computing Technologies
SRM Institute of Science and Technology
Kattankulathur, India
Webserver is a web application designed to convert images to text, which may then be said out using
the anticipated text generated by the image converter. For this application, images are captured
through webcam as hand gesture inputs. In addition, Google Home and Amazon's Alexa may be used
in conjunction with this software. The collected movements may be used for specific smart device
functions, and the software can also call out the gesture inputs in various operating system voices
(OS). Browsers as well as smart devices are able to handle these multiple OS voices. TensorFlow was
used to create this HTML and JavaScript application. In order to run this JavaScript model, we need
the Node.js runtime environment. Using a Machine Learning (ML) method, there is no need to install
drivers or libraries in this application. Once a user has found the webpage, the software is ready for
use.
The sale and purchase of items is beginning to shift from being done in person to being done online.
The goal of this research is to create a product recommendation system on an e-commerce platform
that is tailored to the demands of the users. This research focuses on providing recommendations based
on the 'rating' or 'preference' that a user would give to an item and provides recommendations to
existing users and new users. These users can get personalized recommendations from the
recommendation system, which can help them make better decisions in their online purchases, boost
sales, redefine their user experience, retain consumers, and improve their shopping experience. Thus
the Seller can determine which product to launch in the market based on consumer preferences to gain
more benefits.
To know the distance of things without using the old school methods of scales are something that’s
fascinating. Technology development has led to bringing numerous methods to find the distance of an
object using computer technology. The method most used is the one involving camera. This method
has proved to work well but one of the major drawbacks is in identifying the image. On the other hand,
distance sensors help us accomplish this task more efficiently. Therefore, this research work is based
on how a camera and a distance sensor is used to measure the distance of an object or an obstacle.
Micro Aerial Vehicle (MAV) is widely employed in the global industry, and it is used in various
of sectors for a variety of applications. The MAV is used by a variety of companies to transport
packages. They're also deployed in a variety of military and civilian applications. For long range and
non-viewable locations, the MAV utilizing image processing. The MAV are unmanned vehicle they
depend upon the information sent by the sensor for the navigation. Sometimes failure may occur and
the MAV may face some damages. Until date, the work in this field has focused on object detection
or distance estimate; however, in this study, the algorithm that developed can compute both. This
combined process will be more useful in the indoor environment for the navigating the MAV (can be
used for avoiding the collision or an obstacle easily while navigating in the indoor environment). This
combined method may reduce the chances of failure. Detailed explanation and experimental results
are explained below.
Brain tumour analysis without human intervention is a critical field of research. Convolutional neural
networks, on the other hand, can be used to do this (CNNs). They have excelled at solving computer
vision problems as well as a variety of others, including visual object recognition, detection, and
segmentation. It detects brain tumours by improving brain images utilising segmentation algorithms
that are extremely resistant to noise and cluster size sensitivity issues, as well as automatic area of
Interest (ROI) recognition. One of the key arguments for using CNNs is that they have a high level of
accuracy and do not require manual feature extraction. Detecting a brain tumour and correctly
identifying its type is a difficult undertaking. The performance of CCN is great.than others thanks to
its wide usage in recognising images. neoplasm Manual classification with It's possible to make
blunders in prediction and diagnosis with human assistance. Furthermore, it is a frustrating chore when
there is an excessive amount of knowledge to be aided. Because of the wide diversity of appearances
of brain tumours and the resemblance of tumour and normal tissues, extracting tumour regions from
pictures becomes difficult.
A large number of buildings are now being built and planned based on the needs of the buildings and
aesthetic considerations. Most buildings are built with a local structure such as X shape or V shape
with inconsistent x and y links. Earthquakes cause extensive damage to various buildings, the main
problem being thin. The main purpose of this study is to make a comparative analysis of the dynamic
behavior of buildings with different structural properties in all earthquake zones and soil types.
RC structures with an unusual G + 10 floor are also analyzed without the cross-bracing integration
system, which is one of the best ways to concentrate, in the presented problem. The structural response
to various earth movements is determined using analytical time history. For analysis, the ETABS 2016
program has been hired. It will investigate the effects of the models (most narrative shifts, multi-storey
shear, and multi-storey rigidity).
1Associate Professor & Head , PG Department of Computer Science, Shrimathi Devkunvar Nanalal Bhatt
Vaishnav College for Women, University of Madras, Chennai (TamilNadu), India.
2Research Scholar, Research Department of Computer Science, Shrimathi Devkunvar Nanalal Bhatt Vaishnav
College for Women, University of Madras, Chennai (TamilNadu), India.
Closed circuit television (CCTV) surveillance for detecting the humans involves an expanded research
analysis especially for crime scene detection due to various restraints such as crowded annotation,
night footages, and rainy (noisy) clips. The main visualization of the crime scene is to recognize the
person in particular obtained in all frames is a challenging task. For this occurrence, Content-Based
Video Retrieval (CBVR) method refines the collection of these video frames resulting keyframes to
reduce the burden of huge storage. Here, Spatio-Temporal classifiers method as an added advantage
with frame differencing and edge detection method reports the human detected keyframes without the
termination of background regions in order to negotiate the crime scene more efficiently. The main
objective of this paper is to analyze the obtained keyframes with Human detection pointing a
distinctive between Spatio-Temporal HOG-SVM and HAAR-like classifier to survey the optimum.
Finally, the resulting keyframes mutated with the canny edge detection method by HOG-SVM sequel
with greater accuracy level of 98.21% compared to HAAR-like classifier.
World Health Organisation states that 20% of children is affected by cerebral palsy which is a
neurological disorder that affects the muscular movement in prenatal, perinatal and postnatal time
period. Rehabilitation for cerebral palsy children involves physiotherapy in which the sessions are
extremely long, tedious and the children are reluctant to continue the entire process . This drawback
can be overcome by Interactive physiotherapic equipment. This helps the children to deviate from
their pain during the therapy. In this project, shoulder wheel is modified as an interactive equipment
by mounting Infra Red sensors and Light Emitting Diode. Infra Red sensors pick signal from eight
sectors in board which triggers the Light Emitting Diode to glow that act as visual feedback for
cerebral palsy children.In addition to that Liquid Crystal Display gives the score for the session done
by Cerebral Palsy children which will help for evaluation purpose and each rotation is accompanied
by a chocolate from automatic chocolate dispenser. The parallel bar is modified as an interactive
equipment by fixing pressure sensors and the audio, robotic action is given as Feedback. The entire
operation is controlled by Arduino microcontroller in both the equipments and it is found that it
produces better response and reduce reluctance during physiotherapy session.
Among recent research, the use of fly ash in partial replacement of cement has steadily increased as
an inexpensive and practical method to dispose of the thermal station by-product, namely fly ash. This
extra ingredient influences the qualities of concrete based on a variety of elements such as cement
grade, % of replacement, environmental conditions, and curing times. As fly ash might affect the
compressive strength and rheological properties of concrete, a review of prior reports on fly ash
concrete mixes subjected to various experimental settings are done. When the substitution proportion
is appropriate, it is proven that a low calcium fly ash concentration increases the compressive strength
of the concrete of concrete matrix over a range of 28 to 56 days and optimizes the concrete rheological
properties. When fly ash is used as a viable substitute for cement, it has a low-cost and long-term
function on the concrete.
Block chain technology is gaining more popularity over the past few years. Blockchain is a distributed
site that is shared between computer network nodes. In today's world of advanced technology, many
people are victims of cybercrime. Data protection becomes one of the most important things. One of
the key technologies of Blockchain is cryptography. Cryptography is a technique which transform
legible data to an ambiguous conformation with the help of keys and does the same in conversely. The
performance of the algorithm steady primarily based on the complication and rotation of the CPU
needed for the Crypto analysis in it. By combining Cryptography techniques and Blockchain
technologies we will see how data can be effectively protected.
The proposal's main purpose is to develop a facial recognition-based attendance management device
for academic institutions in enhancing and replace the traditional attendance system and boost
productivity. The existing outdated method has several flaws. There was a lot of ambiguity, which
resulted in erroneous and inefficient attendance taking. There are numerous issues. When the authority
is unable to enforce the previous system's regulations, problems develop. Thus, this project will use
technology to fix the weaknesses in the current system while remaining cost-effective. By automating
ISBN 978-93-81288-22-1 Prince Shri Venkateshwara Padmavathy Engineering College
Prince Dr. K. Vasudevan college of Engineering and Technology
105 Proceeding of International Conference on Contemporary Engineering and Technology
May 21st – 22nd, 2022
the majority of the tasks, you can take attendance to a whole new level. The face recognition system
will be the technology at work.
The face recognition system will be the technology at work. One of the fundamental features that
could be used to define someone is their face. As a result, it is utilized to trace individual because the
chances of a face deviating or being replicated are limited. Face databases will be built in this project
to feed data into the recognizer algorithm. The likelihood of data being repeated is low. Throughout
the attendance-taking process, the features would be linked to the system to verify identity. Whenever
an user is spotted, their attendance is recorded right away, as well as the necessary data is maintained
in a relational database. The attendance data is collected after the day. A web server operated by the
Raspberry Pi can be used to obtain information about an individual.
In brief, this improved generation of the attendance tracking model not only saved a lot of money but
also gave the authority a lot of ease because many processes were automated.
The project aims to use passive flow control technology on a leading edge protuberant wing and its
impact on aerodynamic performance at different Reynolds number varying surface roughness. Due to
its wide applications in areas such as aircraft wings, wind turbine blades and propellers. The
aerodynamic performance characteristics of the leading-edge protuberanced wing at different
Reynolds Number with surface roughness have been tested. Adding protuberances to the leading edge
of the wing is considered a viable passive control method for separating the flow and increasing
aerodynamic efficiency by positively affecting lift characteristics without introducing additional drag.
The aerodynamic performance of the modified airfoil with leading-edge protuberances was examined
and compared with the baseline NACA 63(4)-021 airfoil. Airfoils were pitched from an initial angle
of attack of 0∘ to 45∘ at constant pitch rates with Reynolds number from to and surface roughness
of 10 different grit sizes. Flow parameters such as velocity is chosen to find the optimised
configuration keeping the amplitude constant as 0.12c and varying wavelength of the leading-edge
protuberances as 0.25c,0.5c,0.75c.
Every online platform on the internet needs to have some kind of recommendation system. A
recommendation system will suggest products or services on a platform to a user, based on their
preference and history. This increases user engagement on the platform, as they help the user in their
choices. Hence, there is a need for a simple recommendation system solution.
Recommendation system works by creating relations between products or the users; and by evaluation
of those relations, it can suggest relevant products related to any product. Hybrid Recommendation
combines the predictions of two or more recommendation techniques. This system combines the
predictions from product - based predictions; implemented using a Graph based recommendation
system, and users - based predictions; implemented using Collaborative Filtering recommendation
system.
finance terrorism. To address these concerns, some countries have proposed making blockchain
technologies only accessible to government-identified individuals. This research paper examines the
feasibility of such a proposal and demonstrates how our proposed architecture model can perform in
real-time. It will discuss the benefits of using blockchain technology in this context and how it can
help to improve security and efficiency. The paper focuses on two essential aspects of the design: how
to verify the identities of individuals in transactions and how to maximize efficiency of this
architecture while promising high security. In addition, the paper will also explore the potential
challenges associated with using blockchain technology in payment gateways.
Server dependability and client security doubt expect data to be revealed prior to sending it to Aiming,
and we want to distinguish watchwords in the data that are stowed away from interlopers and
malignant cloud suppliers that we consider to be a method for impeding the organization. SSE
distributed storage is u