Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.03.007
Madhusudhana K , Shriram P Hegde
In this article, a rhombus shaped fractal microstrip frequency reconfiguration patch antenna is presented. The proposed antenna depending upon the capacitance value of varactor diode resonates at ten distinct frequencies as follows: 1.375GHz, 1.525GHz, 1.725GHz, 2.45GHz, 3.45GHz, 4GHz, 5.3GHz, 5.45GHz, 5.5GHz and 5.825GHz. Design and optimization of microstrip antenna with analysis for different capacitance values of varactor diode is carried out using IE3D simulation tool. The proposed design is realized using FR4 (Dielectric constant εr = 4.4) substrate with dimension (41 × 41 × 1.6) mm3. A single varactor diode inserted upon the slot is used to switch the operating frequency. The proposed design of antenna, both simulated and fabricated is seen to have close agreement, and is appropriate to be used in L, S and C band applications.
{"title":"Reconfigurable fractal microstrip antenna with varactor diode","authors":"Madhusudhana K , Shriram P Hegde","doi":"10.1016/j.gltp.2022.03.007","DOIUrl":"10.1016/j.gltp.2022.03.007","url":null,"abstract":"<div><p>In this article, a rhombus shaped fractal microstrip frequency reconfiguration patch antenna is presented. The proposed antenna depending upon the capacitance value of varactor diode resonates at ten distinct frequencies as follows: 1.375GHz, 1.525GHz, 1.725GHz, 2.45GHz, 3.45GHz, 4GHz, 5.3GHz, 5.45GHz, 5.5GHz and 5.825GHz. Design and optimization of microstrip antenna with analysis for different capacitance values of varactor diode is carried out using IE3D simulation tool. The proposed design is realized using FR4 (Dielectric constant <em>ε<sub>r</sub></em> = 4<em>.</em>4) substrate with dimension (41 × 41 × 1.6) mm<sup>3</sup>. A single varactor diode inserted upon the slot is used to switch the operating frequency. The proposed design of antenna, both simulated and fabricated is seen to have close agreement, and is appropriate to be used in L, S and C band applications.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 183-189"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000127/pdfft?md5=f3ace4dc2f3218d9f7d6b293aa2c9a99&pid=1-s2.0-S2666285X22000127-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81173951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.04.005
Shweta S. Kaddi , Malini M. Patil
The paper aims to develop a regression model using the NKI breast cancer data set. The methodology used to achieve the objectives includes three variations of regression methods viz., linear, multiple, and polynomial, respectively. Regression analysis is one of the efficient predictive modeling methods that help understand the mathematical relationship between the variables. The multiple and polynomial regression methods also work in line with the linear regression model, but the number of independent variables will be varying. Queries related to health care data are of practical interest. The outcome of the predictive model helps in analyzing the behavior of different features of the breast cancer data set and provides useful insights towards the diagnosis of a patient. 14 out of 1570 useful features of the NKI data set are selected for the regression analysis. With different combinations of independent and dependent variables, it is found that multiple regression performs better with 83% accuracy.
{"title":"Forecasting the survival rate of breast cancer patients using a supervised learning method","authors":"Shweta S. Kaddi , Malini M. Patil","doi":"10.1016/j.gltp.2022.04.005","DOIUrl":"10.1016/j.gltp.2022.04.005","url":null,"abstract":"<div><p>The paper aims to develop a regression model using the NKI breast cancer data set. The methodology used to achieve the objectives includes three variations of regression methods viz., linear, multiple, and polynomial, respectively. Regression analysis is one of the efficient predictive modeling methods that help understand the mathematical relationship between the variables. The multiple and polynomial regression methods also work in line with the linear regression model, but the number of independent variables will be varying. Queries related to health care data are of practical interest. The outcome of the predictive model helps in analyzing the behavior of different features of the breast cancer data set and provides useful insights towards the diagnosis of a patient. 14 out of 1570 useful features of the NKI data set are selected for the regression analysis. With different combinations of independent and dependent variables, it is found that multiple regression performs better with 83% accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 25-30"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000413/pdfft?md5=2c95660b423c6ed5ccd81c4cd695b04c&pid=1-s2.0-S2666285X22000413-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84207646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.04.012
Smita C. Chetti , Omkar Yatgal
Quantum Dot Cellular Automata (QCA) is one of the new technologies beyond CMOS. Among various other technologies, this is considered to be most feasible and viable due to its area and power advantages. In this paper the discussion about the origin and progress of research works is carried out with respect to QCA domain. Starting from the basic gate study and designing of Adders few other functional blocks are also discussed. This paper proposes QCA as it is considered as the upcoming technology after the saturation of CMOS technology. QCA is considered so due to its advantages in area, power and timing requirements. This domain is still under research and has not been carried to large extent. Hence the authors have made an attempt in exploring it through designing and have simulated the proposed designs. the working of the design is proved through the simulation results.
{"title":"QCA: A survey and design of logic circuits","authors":"Smita C. Chetti , Omkar Yatgal","doi":"10.1016/j.gltp.2022.04.012","DOIUrl":"10.1016/j.gltp.2022.04.012","url":null,"abstract":"<div><p>Quantum Dot Cellular Automata (QCA) is one of the new technologies beyond CMOS. Among various other technologies, this is considered to be most feasible and viable due to its area and power advantages. In this paper the discussion about the origin and progress of research works is carried out with respect to QCA domain. Starting from the basic gate study and designing of Adders few other functional blocks are also discussed. This paper proposes QCA as it is considered as the upcoming technology after the saturation of CMOS technology. QCA is considered so due to its advantages in area, power and timing requirements. This domain is still under research and has not been carried to large extent. Hence the authors have made an attempt in exploring it through designing and have simulated the proposed designs. the working of the design is proved through the simulation results.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 142-148"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000486/pdfft?md5=8bb8b9d84756c5c42234f294b4d9c46e&pid=1-s2.0-S2666285X22000486-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80244402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.04.019
Rashmi S, Chandrakala B M, Divya M. Ramani, Megha S. Harsur
In today's world, one of the reasons in rise of mortality among people is cancer. A cancerous disease is bound to occur due to the ungovernable growth of certain cells that can scatter to other parts of the body. The different types of cancerous diseases are lung cancer, breast cancer, brain cancer, skin cancer. One among them which is of major concern is the brain cancer. With the emergence of AI-ML techniques, detection of cancerous tumour can be automated. One of the efficient methods for the detection of brain tumour is convolutional neural network. Visual information from various viewpoints is frequently used by humans in their decision-making process. For the recognition of the brain tumour a single image showing an object is insufficient. Multi-view classification aims to improve classification accuracy by combining data from several perspectives into a uniform comprehensive representation for downstream tasks. To aim that it presents a trustworthy multi-view classification, a classification approach that dynamically integrates diverse perspectives at an evidence level, resulting in a new paradigm for multi-view learning. By incorporating data from each view, the method promotes both classification reliability and resilience by combining several viewpoints. The process of segmenting images involves separating areas within a picture into distinct classes in order to identify them and classify them. In CNN there are different architectures like E-Net, T-Net, W-Net to determine the ROI and perform the image segmentation. In order to automate detection of the brain tumour, MRI image segmentation plays vital role. In this paper, a survey on the various image segmentation approaches and its comparison is presented. The main focus here is on strategies that can be improved and optimized over those that are already in use.
{"title":"CNN based multi-view classification and ROI segmentation: A survey","authors":"Rashmi S, Chandrakala B M, Divya M. Ramani, Megha S. Harsur","doi":"10.1016/j.gltp.2022.04.019","DOIUrl":"10.1016/j.gltp.2022.04.019","url":null,"abstract":"<div><p>In today's world, one of the reasons in rise of mortality among people is cancer. A cancerous disease is bound to occur due to the ungovernable growth of certain cells that can scatter to other parts of the body. The different types of cancerous diseases are lung cancer, breast cancer, brain cancer, skin cancer. One among them which is of major concern is the brain cancer. With the emergence of AI-ML techniques, detection of cancerous tumour can be automated. One of the efficient methods for the detection of brain tumour is convolutional neural network. Visual information from various viewpoints is frequently used by humans in their decision-making process. For the recognition of the brain tumour a single image showing an object is insufficient. Multi-view classification aims to improve classification accuracy by combining data from several perspectives into a uniform comprehensive representation for downstream tasks. To aim that it presents a trustworthy multi-view classification, a classification approach that dynamically integrates diverse perspectives at an evidence level, resulting in a new paradigm for multi-view learning. By incorporating data from each view, the method promotes both classification reliability and resilience by combining several viewpoints. The process of segmenting images involves separating areas within a picture into distinct classes in order to identify them and classify them. In CNN there are different architectures like E-Net, T-Net, W-Net to determine the ROI and perform the image segmentation. In order to automate detection of the brain tumour, MRI image segmentation plays vital role. In this paper, a survey on the various image segmentation approaches and its comparison is presented. The main focus here is on strategies that can be improved and optimized over those that are already in use.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 86-90"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000553/pdfft?md5=e6c4d48f52e2faf41f0555f1258a2aa2&pid=1-s2.0-S2666285X22000553-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78594383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.04.004
V Ravi, S.P. Gururaj, H.K. Vedamurthy, M.B. Nirmala
Macro-based malware attacks are on the rise in recent cyber-attacks using malicious code written in visual basic code which can be used to target computers to achieve various exploitations. Macro malware can be obfuscated using various tools and easily evade antivirus software. To detect this macro malware, several methods of machine learning techniques have been proposed with an inadequate dataset for both benign and malicious macro codes which are not reproducible and evaluated on unbalanced datasets. In this paper, use of word embedding technique such as Word2Vec embedding is used for code analysis is proposed to analyze and process macro code written in visual basic language to understand and detect the attack vector before opening the documents. The proposed word embedding technique, called Obfuscated-Word2vec is proposed to detect obfuscated keywords, Obfuscated function names from the macro code and classify them as obfuscated or benign function calls which are later used as feature vectors to train models to extract the most relevant features from macro code and even to help the classifiers to detect more accurately as a downloader, dropper malware, shellcode, PowerShell exploits, etc. Experimental results show that proposed method is reproducible and could detect completely new macro malware by analyzing the macro code by the help of Random forest classifier with 82.65 percent accuracy.
{"title":"Analysing corpus of office documents for macro-based attacks using Machine Learning","authors":"V Ravi, S.P. Gururaj, H.K. Vedamurthy, M.B. Nirmala","doi":"10.1016/j.gltp.2022.04.004","DOIUrl":"10.1016/j.gltp.2022.04.004","url":null,"abstract":"<div><p>Macro-based malware attacks are on the rise in recent cyber-attacks using malicious code written in visual basic code which can be used to target computers to achieve various exploitations. Macro malware can be obfuscated using various tools and easily evade antivirus software. To detect this macro malware, several methods of machine learning techniques have been proposed with an inadequate dataset for both benign and malicious macro codes which are not reproducible and evaluated on unbalanced datasets. In this paper, use of word embedding technique such as Word2Vec embedding is used for code analysis is proposed to analyze and process macro code written in visual basic language to understand and detect the attack vector before opening the documents. The proposed word embedding technique, called <em>Obfuscated-Word2vec</em> is proposed to detect obfuscated keywords, Obfuscated function names from the macro code and classify them as obfuscated or benign function calls which are later used as feature vectors to train models to extract the most relevant features from macro code and even to help the classifiers to detect more accurately as a downloader, dropper malware, shellcode, PowerShell exploits, etc. Experimental results show that proposed method is reproducible and could detect completely new macro malware by analyzing the macro code by the help of Random forest classifier with 82.65 percent accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 20-24"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000401/pdfft?md5=e7b876b452a7172444358a89eb62dde6&pid=1-s2.0-S2666285X22000401-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76899586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.03.011
Sujatha J. , Geetha N. , Jyothi N. , Vishwanath P.
Extending lifetime for far off sensor coordinate through immaterial human perception is unreasonable. To comprehend this concern assorted researchers come up through assembly methodology which preserve construct up a far-off sensor put together extra adaptable, prolonged life time, proficient imperativeness. Nevertheless, an imposing part of planned computations overstuff the congregation chief in midst of pack diversion plan. Front attitude such a circumstance, proposal of fluffy analysis is superior the circumstance essential authority in distant sensor systematize. Fleecy reasoning is lesion up being additional usual for heap dispersion amongst sensor center points at last extending structure lifetime. Here Type2 fleecy reasoning is planned which handles uncertain level decisions enhanced than sort feathery reasoning. For the most part here essentialness smoothing out provoking extend structure lifetime using gather is cultivated. Likewise, the proposed fleecy reasoning which picks the gathering head just as show how organize life span can be stretched out close via immaterial cluster adversity in the midst of transmission process. Various computation as well as the connected structure lifetime is in like manner showed up through feathery analysis mounting most outrageous structure lifetime appeared differently in relation to other people.
{"title":"An enhancing for cluster head selection using fuzzy logic in wireless sensor network","authors":"Sujatha J. , Geetha N. , Jyothi N. , Vishwanath P.","doi":"10.1016/j.gltp.2022.03.011","DOIUrl":"10.1016/j.gltp.2022.03.011","url":null,"abstract":"<div><p>Extending lifetime for far off sensor coordinate through immaterial human perception is unreasonable. To comprehend this concern assorted researchers come up through assembly methodology which preserve construct up a far-off sensor put together extra adaptable, prolonged life time, proficient imperativeness. Nevertheless, an imposing part of planned computations overstuff the congregation chief in midst of pack diversion plan. Front attitude such a circumstance, proposal of fluffy analysis is superior the circumstance essential authority in distant sensor systematize. Fleecy reasoning is lesion up being additional usual for heap dispersion amongst sensor center points at last extending structure lifetime. Here Type2 fleecy reasoning is planned which handles uncertain level decisions enhanced than sort feathery reasoning. For the most part here essentialness smoothing out provoking extend structure lifetime using gather is cultivated. Likewise, the proposed fleecy reasoning which picks the gathering head just as show how organize life span can be stretched out close via immaterial cluster adversity in the midst of transmission process. Various computation as well as the connected structure lifetime is in like manner showed up through feathery analysis mounting most outrageous structure lifetime appeared differently in relation to other people.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 202-207"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000164/pdfft?md5=36d6de5a26ab71091fea86ca9afdec8b&pid=1-s2.0-S2666285X22000164-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82964498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.04.015
Shilpa V , Vidya A , Santosh Pattar
Recent advancements in the communication protocols and the networking technologies have enabled connectivity of a wide range of objects, resulting in the Internet of Things (IoT) network. The protocols like MQ Telemetry Transport (MQTT), as well as Constrained Application Protocol (CoAP) are moderately capable of providing the management of heterogeneous wireless sensor networks even in an environment with very limited bandwidth. In this paper, we develop a lightweight encryption algorithm to obtain reliable secure data transmission between IoT devices. We propose a Secure Reliable Message Communication (SEC-RMC) protocol using Mosquitto MQTT message broker with cryptographic enhancements to offer security services and also provide the mutual authentication in the IoT environment at the transport layer. The proposed scheme decreases the number of messages transmitted between the devices. Also, the authentication scheme provides resistance to DNS hacking, routing table poisoning and packet mistreatment. On comparison with the existing methods, the transmission time has been reduced by 80% in this work.
{"title":"MQTT based Secure Transport Layer Communication for Mutual Authentication in IoT Network","authors":"Shilpa V , Vidya A , Santosh Pattar","doi":"10.1016/j.gltp.2022.04.015","DOIUrl":"10.1016/j.gltp.2022.04.015","url":null,"abstract":"<div><p>Recent advancements in the communication protocols and the networking technologies have enabled connectivity of a wide range of objects, resulting in the Internet of Things (IoT) network. The protocols like MQ Telemetry Transport (MQTT), as well as Constrained Application Protocol (CoAP) are moderately capable of providing the management of heterogeneous wireless sensor networks even in an environment with very limited bandwidth. In this paper, we develop a lightweight encryption algorithm to obtain reliable secure data transmission between IoT devices. We propose a Secure Reliable Message Communication (SEC-RMC) protocol using Mosquitto MQTT message broker with cryptographic enhancements to offer security services and also provide the mutual authentication in the IoT environment at the transport layer. The proposed scheme decreases the number of messages transmitted between the devices. Also, the authentication scheme provides resistance to DNS hacking, routing table poisoning and packet mistreatment. On comparison with the existing methods, the transmission time has been reduced by 80% in this work.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 60-66"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000516/pdfft?md5=02539f9efde370a4d5e7ee4c4144e039&pid=1-s2.0-S2666285X22000516-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76001039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Twitter is a miniature writing for a blog site which gives phase to individuals to share as well as communicate their perspectives about point, activities, items plus other medicinal harms. Tweets can be arranged keen on assorted classes reliant on their significance through the tip looked. NLP for wellbeing linked exploration be at present utilize in combination of tweet keen on positive as well as negative classes reliant on their approach utilizing normal language handling strategy. This paper contain execution of NLP (Bag of words) for message alliance reliant on twitter omicron tweet informational catalog utilizing sentiment preparing information utilizing twitter statistics set as well as suggest a plan to further expand categorization. Utilization of Lemmatization alongside NLP can further expand accuracy of characterization of tweets, via bountiful encouragement, pessimism as well as impartiality score of vocabulary present in tweet. For genuine effecting of this structure python through NLP plus twitter informational compilation be used. In this paper we are concerning feelings exploration in twitter tweet for omicron datasets to arrange the survey of all consumers whether it is positive, negative or impartial.
Twitter是一个微型的博客网站,它让个人可以分享和交流他们对观点、活动、物品和其他药物危害的看法。推文可以根据其重要性按照不同的类别进行排列。与健康相关的探索的NLP目前结合使用积极和消极的课程,这取决于他们使用正常语言处理策略的方法。本文利用twitter统计集的情感准备信息,对依赖于twitter omicron tweet信息目录的消息联盟进行了NLP (Bag of words)的执行,并提出了进一步扩大分类的计划。词汇化与NLP结合使用,通过对推文中词汇的慷慨鼓励、悲观和公正得分,可以进一步扩大推文表征的准确性。为了使这个结构真正有效,使用python通过NLP加twitter信息编译。本文针对omicron数据集在twitter tweet中的感受探索,安排对所有消费者的调查,无论是正面的、负面的还是公正的。
{"title":"An omicron variant tweeter sentiment analysis using NLP technique","authors":"Sangamesh Hosgurmath , Vishwanath Petli , V.K. Jalihal","doi":"10.1016/j.gltp.2022.03.025","DOIUrl":"10.1016/j.gltp.2022.03.025","url":null,"abstract":"<div><p>Twitter is a miniature writing for a blog site which gives phase to individuals to share as well as communicate their perspectives about point, activities, items plus other medicinal harms. Tweets can be arranged keen on assorted classes reliant on their significance through the tip looked. NLP for wellbeing linked exploration be at present utilize in combination of tweet keen on positive as well as negative classes reliant on their approach utilizing normal language handling strategy. This paper contain execution of NLP (Bag of words) for message alliance reliant on twitter omicron tweet informational catalog utilizing sentiment preparing information utilizing twitter statistics set as well as suggest a plan to further expand categorization. Utilization of Lemmatization alongside NLP can further expand accuracy of characterization of tweets, via bountiful encouragement, pessimism as well as impartiality score of vocabulary present in tweet. For genuine effecting of this structure python through NLP plus twitter informational compilation be used. In this paper we are concerning feelings exploration in twitter tweet for omicron datasets to arrange the survey of all consumers whether it is positive, negative or impartial.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 215-219"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000310/pdfft?md5=6cad4ab38bd9a66c778e9e8a5deb1d23&pid=1-s2.0-S2666285X22000310-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79464950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01DOI: 10.1016/j.gltp.2022.04.023
Balakrishna K, Rajesh N
Arduino UNO-based Solar powered Grasscutter designed to cut healthy grass in places like parks, hotels, public places, etc., The Grasscutter is designed through IoT (Internet of Things) technology, which is controlled remotely through Blynk application supported with Bluetooth module. The proposed model consists of hardware components like Arduino UNO, Solar panel, DC motor, motor driver, rechargeable batteries and Bluetooth module. The designed model is programmed through Arduino IDE to control the operation of the Grasscutter. The control mechanism and movements such as Forward movement, Backward movement, Right movement, Left movement, On mechanism, Off mechanism and Stop function for the Grasscutter prototype. An ultrasonic sensor connected to the head of the model avoids the system from colliding with obstacles while in movement.
{"title":"Design of remote monitored solar powered grasscutter robot with obstacle avoidance using IoT","authors":"Balakrishna K, Rajesh N","doi":"10.1016/j.gltp.2022.04.023","DOIUrl":"10.1016/j.gltp.2022.04.023","url":null,"abstract":"<div><p>Arduino UNO-based Solar powered Grasscutter designed to cut healthy grass in places like parks, hotels, public places, etc., The Grasscutter is designed through IoT (Internet of Things) technology, which is controlled remotely through Blynk application supported with Bluetooth module. The proposed model consists of hardware components like Arduino UNO, Solar panel, DC motor, motor driver, rechargeable batteries and Bluetooth module. The designed model is programmed through Arduino IDE to control the operation of the Grasscutter. The control mechanism and movements such as Forward movement, Backward movement, Right movement, Left movement, On mechanism, Off mechanism and Stop function for the Grasscutter prototype. An ultrasonic sensor connected to the head of the model avoids the system from colliding with obstacles while in movement.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 109-113"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000590/pdfft?md5=bc198baf89f540278d96b9d4cdb483eb&pid=1-s2.0-S2666285X22000590-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86627477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}