Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.03.020
CH. Naga Sai Kalyan, Chintalapudi V Suresh
In this paper, a seagull optimization algorithm (SOA) based 3-Degree-of-freedom (DOF) proportional-integral-derivative (3DOFPID) controller is suggested for load frequency control of multi-area interconnected power system (MAIPS). The considered MAIPS comprises of two areas with Thermal-Hydro-Nuclear generation units in each area. Analysis has been carried out by subjugating area-1 of MAIPS with a step load disturbance (SLD) of 10%. The sovereignty of presented SOA tuned 3DOFPID in regulating the stability of MAIPS is revealed upon comparing with the performances of 2DOFPID and conventional PID controllers. MIPS is analyzed dynamically without and with considering the nonlinear realistic constraint of communication time delays (CTDs) to demonstrate its impact on load frequency control performance. Simulation results disclosed that, MAIPS dynamical behavior is slightly more deviated up on considering CTDs and is justified.
{"title":"Higher Order Degree of Freedom Controller for Load Frequency Control of Multi Area Interconnected Power System with Time Delays","authors":"CH. Naga Sai Kalyan, Chintalapudi V Suresh","doi":"10.1016/j.gltp.2022.03.020","DOIUrl":"10.1016/j.gltp.2022.03.020","url":null,"abstract":"<div><p>In this paper, a seagull optimization algorithm (SOA) based 3-Degree-of-freedom (DOF) proportional-integral-derivative (3DOFPID) controller is suggested for load frequency control of multi-area interconnected power system (MAIPS). The considered MAIPS comprises of two areas with Thermal-Hydro-Nuclear generation units in each area. Analysis has been carried out by subjugating area-1 of MAIPS with a step load disturbance (SLD) of 10%. The sovereignty of presented SOA tuned 3DOFPID in regulating the stability of MAIPS is revealed upon comparing with the performances of 2DOFPID and conventional PID controllers. MIPS is analyzed dynamically without and with considering the nonlinear realistic constraint of communication time delays (CTDs) to demonstrate its impact on load frequency control performance. Simulation results disclosed that, MAIPS dynamical behavior is slightly more deviated up on considering CTDs and is justified.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 332-337"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000267/pdfft?md5=362ca1545daa5d693f195a6c16d6d1a0&pid=1-s2.0-S2666285X22000267-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75391520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.04.004
V Ravi, S.P. Gururaj, H.K. Vedamurthy, M.B. Nirmala
Macro-based malware attacks are on the rise in recent cyber-attacks using malicious code written in visual basic code which can be used to target computers to achieve various exploitations. Macro malware can be obfuscated using various tools and easily evade antivirus software. To detect this macro malware, several methods of machine learning techniques have been proposed with an inadequate dataset for both benign and malicious macro codes which are not reproducible and evaluated on unbalanced datasets. In this paper, use of word embedding technique such as Word2Vec embedding is used for code analysis is proposed to analyze and process macro code written in visual basic language to understand and detect the attack vector before opening the documents. The proposed word embedding technique, called Obfuscated-Word2vec is proposed to detect obfuscated keywords, Obfuscated function names from the macro code and classify them as obfuscated or benign function calls which are later used as feature vectors to train models to extract the most relevant features from macro code and even to help the classifiers to detect more accurately as a downloader, dropper malware, shellcode, PowerShell exploits, etc. Experimental results show that proposed method is reproducible and could detect completely new macro malware by analyzing the macro code by the help of Random forest classifier with 82.65 percent accuracy.
{"title":"Analysing corpus of office documents for macro-based attacks using Machine Learning","authors":"V Ravi, S.P. Gururaj, H.K. Vedamurthy, M.B. Nirmala","doi":"10.1016/j.gltp.2022.04.004","DOIUrl":"10.1016/j.gltp.2022.04.004","url":null,"abstract":"<div><p>Macro-based malware attacks are on the rise in recent cyber-attacks using malicious code written in visual basic code which can be used to target computers to achieve various exploitations. Macro malware can be obfuscated using various tools and easily evade antivirus software. To detect this macro malware, several methods of machine learning techniques have been proposed with an inadequate dataset for both benign and malicious macro codes which are not reproducible and evaluated on unbalanced datasets. In this paper, use of word embedding technique such as Word2Vec embedding is used for code analysis is proposed to analyze and process macro code written in visual basic language to understand and detect the attack vector before opening the documents. The proposed word embedding technique, called <em>Obfuscated-Word2vec</em> is proposed to detect obfuscated keywords, Obfuscated function names from the macro code and classify them as obfuscated or benign function calls which are later used as feature vectors to train models to extract the most relevant features from macro code and even to help the classifiers to detect more accurately as a downloader, dropper malware, shellcode, PowerShell exploits, etc. Experimental results show that proposed method is reproducible and could detect completely new macro malware by analyzing the macro code by the help of Random forest classifier with 82.65 percent accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 20-24"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000401/pdfft?md5=e7b876b452a7172444358a89eb62dde6&pid=1-s2.0-S2666285X22000401-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76899586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-06DOI: 10.1016/j.gltp.2022.04.019
Rashmi S, Chandrakala B M, Divya M. Ramani, Megha S. Harsur
In today's world, one of the reasons in rise of mortality among people is cancer. A cancerous disease is bound to occur due to the ungovernable growth of certain cells that can scatter to other parts of the body. The different types of cancerous diseases are lung cancer, breast cancer, brain cancer, skin cancer. One among them which is of major concern is the brain cancer. With the emergence of AI-ML techniques, detection of cancerous tumour can be automated. One of the efficient methods for the detection of brain tumour is convolutional neural network. Visual information from various viewpoints is frequently used by humans in their decision-making process. For the recognition of the brain tumour a single image showing an object is insufficient. Multi-view classification aims to improve classification accuracy by combining data from several perspectives into a uniform comprehensive representation for downstream tasks. To aim that it presents a trustworthy multi-view classification, a classification approach that dynamically integrates diverse perspectives at an evidence level, resulting in a new paradigm for multi-view learning. By incorporating data from each view, the method promotes both classification reliability and resilience by combining several viewpoints. The process of segmenting images involves separating areas within a picture into distinct classes in order to identify them and classify them. In CNN there are different architectures like E-Net, T-Net, W-Net to determine the ROI and perform the image segmentation. In order to automate detection of the brain tumour, MRI image segmentation plays vital role. In this paper, a survey on the various image segmentation approaches and its comparison is presented. The main focus here is on strategies that can be improved and optimized over those that are already in use.
{"title":"CNN based multi-view classification and ROI segmentation: A survey","authors":"Rashmi S, Chandrakala B M, Divya M. Ramani, Megha S. Harsur","doi":"10.1016/j.gltp.2022.04.019","DOIUrl":"10.1016/j.gltp.2022.04.019","url":null,"abstract":"<div><p>In today's world, one of the reasons in rise of mortality among people is cancer. A cancerous disease is bound to occur due to the ungovernable growth of certain cells that can scatter to other parts of the body. The different types of cancerous diseases are lung cancer, breast cancer, brain cancer, skin cancer. One among them which is of major concern is the brain cancer. With the emergence of AI-ML techniques, detection of cancerous tumour can be automated. One of the efficient methods for the detection of brain tumour is convolutional neural network. Visual information from various viewpoints is frequently used by humans in their decision-making process. For the recognition of the brain tumour a single image showing an object is insufficient. Multi-view classification aims to improve classification accuracy by combining data from several perspectives into a uniform comprehensive representation for downstream tasks. To aim that it presents a trustworthy multi-view classification, a classification approach that dynamically integrates diverse perspectives at an evidence level, resulting in a new paradigm for multi-view learning. By incorporating data from each view, the method promotes both classification reliability and resilience by combining several viewpoints. The process of segmenting images involves separating areas within a picture into distinct classes in order to identify them and classify them. In CNN there are different architectures like E-Net, T-Net, W-Net to determine the ROI and perform the image segmentation. In order to automate detection of the brain tumour, MRI image segmentation plays vital role. In this paper, a survey on the various image segmentation approaches and its comparison is presented. The main focus here is on strategies that can be improved and optimized over those that are already in use.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 86-90"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000553/pdfft?md5=e6c4d48f52e2faf41f0555f1258a2aa2&pid=1-s2.0-S2666285X22000553-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78594383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.04.012
Smita C. Chetti , Omkar Yatgal
Quantum Dot Cellular Automata (QCA) is one of the new technologies beyond CMOS. Among various other technologies, this is considered to be most feasible and viable due to its area and power advantages. In this paper the discussion about the origin and progress of research works is carried out with respect to QCA domain. Starting from the basic gate study and designing of Adders few other functional blocks are also discussed. This paper proposes QCA as it is considered as the upcoming technology after the saturation of CMOS technology. QCA is considered so due to its advantages in area, power and timing requirements. This domain is still under research and has not been carried to large extent. Hence the authors have made an attempt in exploring it through designing and have simulated the proposed designs. the working of the design is proved through the simulation results.
{"title":"QCA: A survey and design of logic circuits","authors":"Smita C. Chetti , Omkar Yatgal","doi":"10.1016/j.gltp.2022.04.012","DOIUrl":"10.1016/j.gltp.2022.04.012","url":null,"abstract":"<div><p>Quantum Dot Cellular Automata (QCA) is one of the new technologies beyond CMOS. Among various other technologies, this is considered to be most feasible and viable due to its area and power advantages. In this paper the discussion about the origin and progress of research works is carried out with respect to QCA domain. Starting from the basic gate study and designing of Adders few other functional blocks are also discussed. This paper proposes QCA as it is considered as the upcoming technology after the saturation of CMOS technology. QCA is considered so due to its advantages in area, power and timing requirements. This domain is still under research and has not been carried to large extent. Hence the authors have made an attempt in exploring it through designing and have simulated the proposed designs. the working of the design is proved through the simulation results.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 142-148"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000486/pdfft?md5=8bb8b9d84756c5c42234f294b4d9c46e&pid=1-s2.0-S2666285X22000486-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80244402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.04.005
Shweta S. Kaddi , Malini M. Patil
The paper aims to develop a regression model using the NKI breast cancer data set. The methodology used to achieve the objectives includes three variations of regression methods viz., linear, multiple, and polynomial, respectively. Regression analysis is one of the efficient predictive modeling methods that help understand the mathematical relationship between the variables. The multiple and polynomial regression methods also work in line with the linear regression model, but the number of independent variables will be varying. Queries related to health care data are of practical interest. The outcome of the predictive model helps in analyzing the behavior of different features of the breast cancer data set and provides useful insights towards the diagnosis of a patient. 14 out of 1570 useful features of the NKI data set are selected for the regression analysis. With different combinations of independent and dependent variables, it is found that multiple regression performs better with 83% accuracy.
{"title":"Forecasting the survival rate of breast cancer patients using a supervised learning method","authors":"Shweta S. Kaddi , Malini M. Patil","doi":"10.1016/j.gltp.2022.04.005","DOIUrl":"10.1016/j.gltp.2022.04.005","url":null,"abstract":"<div><p>The paper aims to develop a regression model using the NKI breast cancer data set. The methodology used to achieve the objectives includes three variations of regression methods viz., linear, multiple, and polynomial, respectively. Regression analysis is one of the efficient predictive modeling methods that help understand the mathematical relationship between the variables. The multiple and polynomial regression methods also work in line with the linear regression model, but the number of independent variables will be varying. Queries related to health care data are of practical interest. The outcome of the predictive model helps in analyzing the behavior of different features of the breast cancer data set and provides useful insights towards the diagnosis of a patient. 14 out of 1570 useful features of the NKI data set are selected for the regression analysis. With different combinations of independent and dependent variables, it is found that multiple regression performs better with 83% accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 25-30"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000413/pdfft?md5=2c95660b423c6ed5ccd81c4cd695b04c&pid=1-s2.0-S2666285X22000413-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84207646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.03.007
Madhusudhana K , Shriram P Hegde
In this article, a rhombus shaped fractal microstrip frequency reconfiguration patch antenna is presented. The proposed antenna depending upon the capacitance value of varactor diode resonates at ten distinct frequencies as follows: 1.375GHz, 1.525GHz, 1.725GHz, 2.45GHz, 3.45GHz, 4GHz, 5.3GHz, 5.45GHz, 5.5GHz and 5.825GHz. Design and optimization of microstrip antenna with analysis for different capacitance values of varactor diode is carried out using IE3D simulation tool. The proposed design is realized using FR4 (Dielectric constant εr = 4.4) substrate with dimension (41 × 41 × 1.6) mm3. A single varactor diode inserted upon the slot is used to switch the operating frequency. The proposed design of antenna, both simulated and fabricated is seen to have close agreement, and is appropriate to be used in L, S and C band applications.
{"title":"Reconfigurable fractal microstrip antenna with varactor diode","authors":"Madhusudhana K , Shriram P Hegde","doi":"10.1016/j.gltp.2022.03.007","DOIUrl":"10.1016/j.gltp.2022.03.007","url":null,"abstract":"<div><p>In this article, a rhombus shaped fractal microstrip frequency reconfiguration patch antenna is presented. The proposed antenna depending upon the capacitance value of varactor diode resonates at ten distinct frequencies as follows: 1.375GHz, 1.525GHz, 1.725GHz, 2.45GHz, 3.45GHz, 4GHz, 5.3GHz, 5.45GHz, 5.5GHz and 5.825GHz. Design and optimization of microstrip antenna with analysis for different capacitance values of varactor diode is carried out using IE3D simulation tool. The proposed design is realized using FR4 (Dielectric constant <em>ε<sub>r</sub></em> = 4<em>.</em>4) substrate with dimension (41 × 41 × 1.6) mm<sup>3</sup>. A single varactor diode inserted upon the slot is used to switch the operating frequency. The proposed design of antenna, both simulated and fabricated is seen to have close agreement, and is appropriate to be used in L, S and C band applications.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 183-189"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000127/pdfft?md5=f3ace4dc2f3218d9f7d6b293aa2c9a99&pid=1-s2.0-S2666285X22000127-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81173951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.03.030
Abhishek Sharma, Umesh Kumar Singh
Major backbone of today's competitive and upcoming market is definitely becoming Cloud computing & hence corporate utilize capabilities of cloud computing services. To improve security initiatives by cloud computing service or CRPs, novel types of tools and protocols finds themselves always in demand. In order to build comprehensive risk assessment methodology, extensive literature review was conducted to identify risk factors that may affect cloud computing adoption. In this context various risk factors were identified. After feature selection and identification of risk factors, utilized to select most effective features using linear regression algorithms. Then AI-ML techniques like Decision Tree (DTC), Randomizable Filter Classifier, k-star with RMSE method is used to analyse threats within CC environment. Experimental outcomes depicted that division of dataset to (95%-5%) provided best result out of every remaining partitioning and moreover put forth that DTC algorithm provided best outcomes out of entire data set used in experimental setups.
{"title":"Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms","authors":"Abhishek Sharma, Umesh Kumar Singh","doi":"10.1016/j.gltp.2022.03.030","DOIUrl":"10.1016/j.gltp.2022.03.030","url":null,"abstract":"<div><p>Major backbone of today's competitive and upcoming market is definitely becoming Cloud computing & hence corporate utilize capabilities of cloud computing services. To improve security initiatives by cloud computing service or CRPs, novel types of tools and protocols finds themselves always in demand. In order to build comprehensive risk assessment methodology, extensive literature review was conducted to identify risk factors that may affect cloud computing adoption. In this context various risk factors were identified. After feature selection and identification of risk factors, utilized to select most effective features using linear regression algorithms. Then AI-ML techniques like Decision Tree (DTC), Randomizable Filter Classifier, k-star with RMSE method is used to analyse threats within CC environment. Experimental outcomes depicted that division of dataset to (95%-5%) provided best result out of every remaining partitioning and moreover put forth that DTC algorithm provided best outcomes out of entire data set used in experimental setups.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 243-250"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X2200036X/pdfft?md5=da30c7c469672403b680e1e34ac54ba2&pid=1-s2.0-S2666285X2200036X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81997939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.03.024
Saleem S Tevaramani , Ravi J
The opportunities to exchange information in the current web era have risen. The increased popularity of the media has posed real challenges to security-related issues. Steganography is a technology for the secure exchange of information. A video, audio, or image intended to raise no suspicion may be the carrier. After concealing the secret information, steganography techniques produce an identical cover image. This will prevent outside observers from noticing the existence of secret information. In the proposed work, alpha is a scaling parameter. Cover and payload images of different types and dimensions, live images from a webcam, and predefined images of other formats have been normalized and preprocessed. A Haar Discrete Wavelet Transformation (DWT) is applied to both the cover and payload images. To generate a stego image, the payload image is encrypted and fused with the cover image. The result parameters such as PSNR, MSE, and Entropy are measured.
{"title":"Image steganography performance analysis using discrete wavelet transform and alpha blending for secure communication","authors":"Saleem S Tevaramani , Ravi J","doi":"10.1016/j.gltp.2022.03.024","DOIUrl":"10.1016/j.gltp.2022.03.024","url":null,"abstract":"<div><p>The opportunities to exchange information in the current web era have risen. The increased popularity of the media has posed real challenges to security-related issues. Steganography is a technology for the secure exchange of information. A video, audio, or image intended to raise no suspicion may be the carrier. After concealing the secret information, steganography techniques produce an identical cover image. This will prevent outside observers from noticing the existence of secret information. In the proposed work, alpha is a scaling parameter. Cover and payload images of different types and dimensions, live images from a webcam, and predefined images of other formats have been normalized and preprocessed. A Haar Discrete Wavelet Transformation (DWT) is applied to both the cover and payload images. To generate a stego image, the payload image is encrypted and fused with the cover image. The result parameters such as PSNR, MSE, and Entropy are measured.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 208-214"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000309/pdfft?md5=66c93e7a2b156d6244b62ffa00cfb781&pid=1-s2.0-S2666285X22000309-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80650118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-04DOI: 10.1016/j.gltp.2022.04.023
Balakrishna K, Rajesh N
Arduino UNO-based Solar powered Grasscutter designed to cut healthy grass in places like parks, hotels, public places, etc., The Grasscutter is designed through IoT (Internet of Things) technology, which is controlled remotely through Blynk application supported with Bluetooth module. The proposed model consists of hardware components like Arduino UNO, Solar panel, DC motor, motor driver, rechargeable batteries and Bluetooth module. The designed model is programmed through Arduino IDE to control the operation of the Grasscutter. The control mechanism and movements such as Forward movement, Backward movement, Right movement, Left movement, On mechanism, Off mechanism and Stop function for the Grasscutter prototype. An ultrasonic sensor connected to the head of the model avoids the system from colliding with obstacles while in movement.
{"title":"Design of remote monitored solar powered grasscutter robot with obstacle avoidance using IoT","authors":"Balakrishna K, Rajesh N","doi":"10.1016/j.gltp.2022.04.023","DOIUrl":"10.1016/j.gltp.2022.04.023","url":null,"abstract":"<div><p>Arduino UNO-based Solar powered Grasscutter designed to cut healthy grass in places like parks, hotels, public places, etc., The Grasscutter is designed through IoT (Internet of Things) technology, which is controlled remotely through Blynk application supported with Bluetooth module. The proposed model consists of hardware components like Arduino UNO, Solar panel, DC motor, motor driver, rechargeable batteries and Bluetooth module. The designed model is programmed through Arduino IDE to control the operation of the Grasscutter. The control mechanism and movements such as Forward movement, Backward movement, Right movement, Left movement, On mechanism, Off mechanism and Stop function for the Grasscutter prototype. An ultrasonic sensor connected to the head of the model avoids the system from colliding with obstacles while in movement.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 109-113"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000590/pdfft?md5=bc198baf89f540278d96b9d4cdb483eb&pid=1-s2.0-S2666285X22000590-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86627477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}