Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212183
D.Wishma, S.Gayathri, C. Viknesh, R.Seetharaman
Skin cancer is caused by unrepaired DNA damage to the epidermis, the top layer of skin, which results in mutations and uncontrollable cell proliferation of abnormal cells. Skin cells undergo modification, proliferate rapidly, and transform into malignant tumors as a result. Squamous cell carcinoma, melanoma, and basal cell carcinoma are the three most prevalent kinds of skin cancer. The first two types of skin cancer as well as a few additional less common types are collectively referred to as non-melanoma skin cancer. The size, shape, or color of a mole changes, or it bleeds or itches. Its margins could also be discolored or uneven. Melanoma is the most dangerous type of cancer. In 90% of cases, exposure to the sun's UV rays is to blame. This exposure increases the risk of acquiring any of the three primary kinds of skin cancer. Skin cancer is brought on by unbalanced sunburn cells carried on by continuous UVB exposure. In order to prevent harm, UV intensity is measured and safety precautions are performed for the corresponding intensity. Here is a methodological approach for using a mobile application to diagnose melanoma using dermoscopy images.
{"title":"Diagnosis of Melanoma by Analysing UV-Ray Intensity and Dermoscopy Images Through Mobile Application","authors":"D.Wishma, S.Gayathri, C. Viknesh, R.Seetharaman","doi":"10.1109/ICECAA58104.2023.10212183","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212183","url":null,"abstract":"Skin cancer is caused by unrepaired DNA damage to the epidermis, the top layer of skin, which results in mutations and uncontrollable cell proliferation of abnormal cells. Skin cells undergo modification, proliferate rapidly, and transform into malignant tumors as a result. Squamous cell carcinoma, melanoma, and basal cell carcinoma are the three most prevalent kinds of skin cancer. The first two types of skin cancer as well as a few additional less common types are collectively referred to as non-melanoma skin cancer. The size, shape, or color of a mole changes, or it bleeds or itches. Its margins could also be discolored or uneven. Melanoma is the most dangerous type of cancer. In 90% of cases, exposure to the sun's UV rays is to blame. This exposure increases the risk of acquiring any of the three primary kinds of skin cancer. Skin cancer is brought on by unbalanced sunburn cells carried on by continuous UVB exposure. In order to prevent harm, UV intensity is measured and safety precautions are performed for the corresponding intensity. Here is a methodological approach for using a mobile application to diagnose melanoma using dermoscopy images.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212142
S. Hussain, M. Roopa
In IoT-LLN networks, RPL is a widely used routing protocol. RPL provides a lightweight and efficient way to route packets between devices in LLNs, creating a mesh network topology. For network bootstrapping and maintenance purposes, it periodically transmits DIO, DIS, DAO, and DAO-ACK packets. The lower-layer 6TiS CH protocol uses only a single minimal cell in a slotframe to transfer control messages. This increases the transmitting control messages' queue size. The packets in the transmission queue that have been waiting for a long time are removed from the queue. Network-associated nodes transfer control messages simultaneously, which causes the collision. Because of these issues, nodes waiting to join the network are not receiving the required control messages, and remain unassociated. Network-associated nodes must receive the DIO packets regularly to update the network topology information. If these nodes do not receive the DIO packets, it causes unnecessary parent-switching measures. Extensive simulations were done using Contiki-NG's COOJA simulator with varying network sizes, slotframe lengths, and hop sequences. Increased network size, slotframe lengths, and hop sequence caused more control message collisions, and parent-switching.
{"title":"Evaluating the Impact of RPL Control Overhead on Network Performance","authors":"S. Hussain, M. Roopa","doi":"10.1109/ICECAA58104.2023.10212142","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212142","url":null,"abstract":"In IoT-LLN networks, RPL is a widely used routing protocol. RPL provides a lightweight and efficient way to route packets between devices in LLNs, creating a mesh network topology. For network bootstrapping and maintenance purposes, it periodically transmits DIO, DIS, DAO, and DAO-ACK packets. The lower-layer 6TiS CH protocol uses only a single minimal cell in a slotframe to transfer control messages. This increases the transmitting control messages' queue size. The packets in the transmission queue that have been waiting for a long time are removed from the queue. Network-associated nodes transfer control messages simultaneously, which causes the collision. Because of these issues, nodes waiting to join the network are not receiving the required control messages, and remain unassociated. Network-associated nodes must receive the DIO packets regularly to update the network topology information. If these nodes do not receive the DIO packets, it causes unnecessary parent-switching measures. Extensive simulations were done using Contiki-NG's COOJA simulator with varying network sizes, slotframe lengths, and hop sequences. Increased network size, slotframe lengths, and hop sequence caused more control message collisions, and parent-switching.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131475594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212218
P. Latha, Victoria Jancee, K. Kaviyarasan, S. Aghalya, J. Martin, L. Manickam
This research study intends to develop a novel method for identifying over-current or fault-current concerns in appliances and electronics used in the home or industry, such as battery and chargers is discussed. The system monitors electrical circuits in real-time, detects faults, and alerts appropriate parties through sound alarms and email notifications. The system may be configured according to individual defect detection needs. The NIOS II (Altera DE2 EDK) processor controls the numerous components and processes and analyzes data. To properly monitor electrical characteristics, voltage, and current sensors are added into the system. The NIOS II processor continually monitors observed data and compares them to specified threshold levels. An alarm sounds if voltage or current exceeds the thresholds, communicating an issue or abnormal situation. Through IoT server connectivity, the system sends email notifications in addition to the sound alert. An email notice is sent to a predetermined email address when a fault condition is detected, providing remote monitoring and quick information about the fault occurrence. The system's benefits include reconfigurability, monitoring in real-time, alarm alerting, remote email notification, safety, and customization.
本研究旨在开发一种新的方法来识别家庭或工业中使用的电器和电子产品中的过流或故障电流问题,例如电池和充电器。系统对电路进行实时监控,及时发现故障,并通过声音报警、邮件通知等方式向相关方发出警报。系统可以根据单个缺陷检测的需要进行配置。NIOS II (Altera DE2 EDK)处理器控制众多组件和进程并分析数据。为了正确地监控电气特性,在系统中添加了电压和电流传感器。NIOS II处理器持续监视观察到的数据,并将它们与指定的阈值水平进行比较。当电压或电流超过阈值时发出告警,提示存在问题或异常情况。通过物联网服务器连接,系统除了发出声音警报外,还会发送电子邮件通知。当检测到故障情况时,通过邮件通知的方式发送到指定邮箱,实现远程监控和快速了解故障发生情况。该系统的优点包括可重构性、实时监控、警报警报、远程电子邮件通知、安全性和可定制性。
{"title":"Reconfigurable Fault Current Detection System Using IoT","authors":"P. Latha, Victoria Jancee, K. Kaviyarasan, S. Aghalya, J. Martin, L. Manickam","doi":"10.1109/ICECAA58104.2023.10212218","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212218","url":null,"abstract":"This research study intends to develop a novel method for identifying over-current or fault-current concerns in appliances and electronics used in the home or industry, such as battery and chargers is discussed. The system monitors electrical circuits in real-time, detects faults, and alerts appropriate parties through sound alarms and email notifications. The system may be configured according to individual defect detection needs. The NIOS II (Altera DE2 EDK) processor controls the numerous components and processes and analyzes data. To properly monitor electrical characteristics, voltage, and current sensors are added into the system. The NIOS II processor continually monitors observed data and compares them to specified threshold levels. An alarm sounds if voltage or current exceeds the thresholds, communicating an issue or abnormal situation. Through IoT server connectivity, the system sends email notifications in addition to the sound alert. An email notice is sent to a predetermined email address when a fault condition is detected, providing remote monitoring and quick information about the fault occurrence. The system's benefits include reconfigurability, monitoring in real-time, alarm alerting, remote email notification, safety, and customization.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"325-326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212245
P. Ramya, C.P. Gowtham, S. K. Kumar, T. P. Silpica, P. Renugadevi
Nowadays giving fair verdict is a quite challenging task because of certain contentious aspects in modern cricket. So, in order to avoid making wrong decisions, we develop an automated AI-based solution. This project focus on a technology that helps both the main umpire and third umpire to makes critical determination for Leg Before the Wicket (LBW) regarding whether the batsman is out or not-out and also minimizes the waiting time for players until the third umpire go through the trajectory of the ball to make a correct decision. The main purpose of our AI-DRS is to remove the umpires call which plays a vital role in giving third umpires decision because whether any one of the cases shows umpires call the decision will be stick with on-field umpires call whether it may be out or not-out. The pitch report and comprehensive cricket laws are also included for the sake of the game. The pitch report will be examined with several key wicket characteristics, such as kind of soil, cracks, amount of grass cover, and wetness, etc. using drone we capture the video of the match day pitch. To determine the field crack, canny edge detection is performed and soil moisture sensor is used to determine the moisture content of the soil. This information help cricket team to make a decision about whether to bat or field after winning the toss and helps to choose the strongest 11 players through which can win the match on that pitch on that day. Utilizing support vector machine (SVM) and histograms of gradients (HOG), objects are classified and recognized. In order to monitor and forecast the velocity of the ball, linear regression and quadratic regression are applied. Finally, Tkinter is used for GUI development, imutils and OpenCV are used as implementation tools. Due to the controversy of rare wicket calls, boundary and penalty runs, we bring a voice recognized AI system which gave fans to easily understand why this decision is made by the umpire and sometime umpires found difficulty to remember some rules which is rarely used in cricket it will also give assist to on-field umpires to give a very clear idea why he made the decision, the on-field umpires can easily access the laws through voice recognition which use Alan-AI. The Voice recognition web app was developed using react-js.
{"title":"A Customisable AI Deck for Pitch Reports and Automated III Umpire Decision Review System DRS","authors":"P. Ramya, C.P. Gowtham, S. K. Kumar, T. P. Silpica, P. Renugadevi","doi":"10.1109/ICECAA58104.2023.10212245","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212245","url":null,"abstract":"Nowadays giving fair verdict is a quite challenging task because of certain contentious aspects in modern cricket. So, in order to avoid making wrong decisions, we develop an automated AI-based solution. This project focus on a technology that helps both the main umpire and third umpire to makes critical determination for Leg Before the Wicket (LBW) regarding whether the batsman is out or not-out and also minimizes the waiting time for players until the third umpire go through the trajectory of the ball to make a correct decision. The main purpose of our AI-DRS is to remove the umpires call which plays a vital role in giving third umpires decision because whether any one of the cases shows umpires call the decision will be stick with on-field umpires call whether it may be out or not-out. The pitch report and comprehensive cricket laws are also included for the sake of the game. The pitch report will be examined with several key wicket characteristics, such as kind of soil, cracks, amount of grass cover, and wetness, etc. using drone we capture the video of the match day pitch. To determine the field crack, canny edge detection is performed and soil moisture sensor is used to determine the moisture content of the soil. This information help cricket team to make a decision about whether to bat or field after winning the toss and helps to choose the strongest 11 players through which can win the match on that pitch on that day. Utilizing support vector machine (SVM) and histograms of gradients (HOG), objects are classified and recognized. In order to monitor and forecast the velocity of the ball, linear regression and quadratic regression are applied. Finally, Tkinter is used for GUI development, imutils and OpenCV are used as implementation tools. Due to the controversy of rare wicket calls, boundary and penalty runs, we bring a voice recognized AI system which gave fans to easily understand why this decision is made by the umpire and sometime umpires found difficulty to remember some rules which is rarely used in cricket it will also give assist to on-field umpires to give a very clear idea why he made the decision, the on-field umpires can easily access the laws through voice recognition which use Alan-AI. The Voice recognition web app was developed using react-js.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122515119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212301
G. Indra, B. P. Kumar, G. H. Kumar, Mr. B. Srikanth
Media influence's public opinion and decision-making today. Advertisements especially affect audience perceptions, actions, and purchases. A comprehensive data library on commercials and their performance is needed to understand how media affects society. Ad content, placement, and performance are stored in a data warehouse-based ad archive. The archive can evaluate marketing campaigns and discover media trends. Ad servers, social media platforms, and media monitoring tools may build the data warehouse-based ad archive. A dimensional data model helps retrieve and analyze data. Structured Query Language (SQL) queries, Online Analytical Processing (OLAP) cubes, and data visualization tools may access the archive. Media academics, marketers, and politicians may study the media environment using the data warehouse-based ad archive. Media academics may utilize the collection to study the marketing campaigns, media trends and media's influence on society. The archive may help advertisers analyze their ad campaigns, optimize media placement, and understand their target demographic. Policymakers may use the archive to monitor media outlets' advertising compliance and assess policy changes' media landscape effects.
{"title":"Data Warehouse-Based Ad Archive for Media Analysis","authors":"G. Indra, B. P. Kumar, G. H. Kumar, Mr. B. Srikanth","doi":"10.1109/ICECAA58104.2023.10212301","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212301","url":null,"abstract":"Media influence's public opinion and decision-making today. Advertisements especially affect audience perceptions, actions, and purchases. A comprehensive data library on commercials and their performance is needed to understand how media affects society. Ad content, placement, and performance are stored in a data warehouse-based ad archive. The archive can evaluate marketing campaigns and discover media trends. Ad servers, social media platforms, and media monitoring tools may build the data warehouse-based ad archive. A dimensional data model helps retrieve and analyze data. Structured Query Language (SQL) queries, Online Analytical Processing (OLAP) cubes, and data visualization tools may access the archive. Media academics, marketers, and politicians may study the media environment using the data warehouse-based ad archive. Media academics may utilize the collection to study the marketing campaigns, media trends and media's influence on society. The archive may help advertisers analyze their ad campaigns, optimize media placement, and understand their target demographic. Policymakers may use the archive to monitor media outlets' advertising compliance and assess policy changes' media landscape effects.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212163
Sidhant Chourasiya, Gyanesh Samanta, Devadarshan K Sardar, Ponnu Sharma, C. Kumar
The development of weaponized software presents substantial cybersecurity challenges, with the Pegasus spyware, developed by the Israeli group NSO, serving as a prominent example. This malicious code operates covertly, infiltrating target systems without the user's knowledge, extracting sensitive information, and monitoring user behavior. This research aims to investigate the unique characteristics and implications of the Pegasus spyware. Specifically, its zero-click functionality is understood, where exploitation occurs without user interaction and its reliance on zero-day vulnerabilities for system compromise. Furthermore, the study aims to explore the extent of control granted to the Pegasus operator, including command execution, data access, and remote manipulation of hardware components. Through an in-depth analysis, this study examines the technical intricacies of the Pegasus spyware. This study explores its methods of propagation, emphasizing its ability to exploit zero-day vulnerabilities without requiring user engagement. Moreover, mechanisms employed by spyware to establish command and control channels are investigated using HTTPS connections, leading to potential avenues for tracking and detection. The findings reveal the elusive nature of Pegasus, leaving minimal traces of its activities on infected systems. The software's sophisticated techniques and reliance on secure communication channels pose significant challenges in detecting and tracking its presence. The study also highlights the extensive control granted to the Pegasus operator, enabling comprehensive surveillance and data exfiltration from compromised systems. The Pegasus spyware represents a formidable cybersecurity threat due to its stealthy infiltration, powerful surveillance capabilities, and limited traceability. Mitigating this threat necessitates innovative approaches to detect and prevent its deployment. This research provides valuable insights into the workings of Pegasus and paves the way for developing effective countermeasures and mitigation strategies to safeguard systems and user privacy.
{"title":"Pegasus Spyware: A Vulnerable Behaviour-based Attack System","authors":"Sidhant Chourasiya, Gyanesh Samanta, Devadarshan K Sardar, Ponnu Sharma, C. Kumar","doi":"10.1109/ICECAA58104.2023.10212163","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212163","url":null,"abstract":"The development of weaponized software presents substantial cybersecurity challenges, with the Pegasus spyware, developed by the Israeli group NSO, serving as a prominent example. This malicious code operates covertly, infiltrating target systems without the user's knowledge, extracting sensitive information, and monitoring user behavior. This research aims to investigate the unique characteristics and implications of the Pegasus spyware. Specifically, its zero-click functionality is understood, where exploitation occurs without user interaction and its reliance on zero-day vulnerabilities for system compromise. Furthermore, the study aims to explore the extent of control granted to the Pegasus operator, including command execution, data access, and remote manipulation of hardware components. Through an in-depth analysis, this study examines the technical intricacies of the Pegasus spyware. This study explores its methods of propagation, emphasizing its ability to exploit zero-day vulnerabilities without requiring user engagement. Moreover, mechanisms employed by spyware to establish command and control channels are investigated using HTTPS connections, leading to potential avenues for tracking and detection. The findings reveal the elusive nature of Pegasus, leaving minimal traces of its activities on infected systems. The software's sophisticated techniques and reliance on secure communication channels pose significant challenges in detecting and tracking its presence. The study also highlights the extensive control granted to the Pegasus operator, enabling comprehensive surveillance and data exfiltration from compromised systems. The Pegasus spyware represents a formidable cybersecurity threat due to its stealthy infiltration, powerful surveillance capabilities, and limited traceability. Mitigating this threat necessitates innovative approaches to detect and prevent its deployment. This research provides valuable insights into the workings of Pegasus and paves the way for developing effective countermeasures and mitigation strategies to safeguard systems and user privacy.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116505503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212372
K. Dhivya, S. J, K. Premkumar, K. Balasaranya, S. Dhanalakshmi
An Autonomous Mobile Network (AMN) is a wireless network in which no structure is accessible. AMN has significantly assisted in many applications recently. The AMN is often employed in such environments where humans do not exist. Therefore, each mobile node should be understood in case of a malfunction or connection failure between mobile nodes. Ant colony optimization (ACO) techniques have helped to develop AMN routing. An Untrustworthy mobile node Isolation by applying the Belief Factor (UIBF) system to detects the untrustworthy mobile nodes efficiently. The node energy, node cooperativeness, node packet losses, and node delay measures are combined to compute the belief factor. This mechanism uses the ACO algorithm to choose the optimal route from the sender to the recipient. Simulation results evaluate the UIBF approach to provide a better untrustworthy node detection ratio and raise the throughput with minimum network delay.
{"title":"Untrustworthy Mobile Node Isolation by Belief Factor in Autonomous Mobile Network","authors":"K. Dhivya, S. J, K. Premkumar, K. Balasaranya, S. Dhanalakshmi","doi":"10.1109/ICECAA58104.2023.10212372","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212372","url":null,"abstract":"An Autonomous Mobile Network (AMN) is a wireless network in which no structure is accessible. AMN has significantly assisted in many applications recently. The AMN is often employed in such environments where humans do not exist. Therefore, each mobile node should be understood in case of a malfunction or connection failure between mobile nodes. Ant colony optimization (ACO) techniques have helped to develop AMN routing. An Untrustworthy mobile node Isolation by applying the Belief Factor (UIBF) system to detects the untrustworthy mobile nodes efficiently. The node energy, node cooperativeness, node packet losses, and node delay measures are combined to compute the belief factor. This mechanism uses the ACO algorithm to choose the optimal route from the sender to the recipient. Simulation results evaluate the UIBF approach to provide a better untrustworthy node detection ratio and raise the throughput with minimum network delay.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"84 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125924466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212280
S. Kumaravel, M. Nagaraj, G. Bharathiraja
It is a new multi-stage solar freshwater system that uses a photovoltaic (PV) heater. A layer of paraffin wax weighing 15 kg as a phase change material (Paraffin wax) was found at the bottom of the solar still's down basin. Research into the system has been conducted to assess its effectiveness at improving freshwater. Solar rays and a direct current (DC) water heater were used to preheat the saltwater. Surfaces that collect condensation vapor were planned for, such as the single glass lid on top and the bottom of two stacked trays. The purpose of doing so is to make freshwater production more efficient by lowering the resistance of condensation. The extreme heat of the glass cover was reduced by using velocity of cooling water shower. The flow velocity of the shower's cooling water, the impact of the heater, and the depth of lower basin water are all factors included in the research. Solar radiation, paraffin wax, heater input heat found to be proportionate in the innovative solar desalination. An astounding 18 liters per day of distilled water may be generated by the Multiple Stage Effect Photovoltaic Heater (MSEPVH). Both mathematical modelling and experimental were used to calculate the maximum possible cooling water flow rate, the total amount of freshwater, and the effectiveness of MSEPVH on the best possible day.
{"title":"Performance Improvement of Single Slope Solar Still with Exterior Cooling and PCM Using Direct Current Water Heaters and Photovoltaic Panels","authors":"S. Kumaravel, M. Nagaraj, G. Bharathiraja","doi":"10.1109/ICECAA58104.2023.10212280","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212280","url":null,"abstract":"It is a new multi-stage solar freshwater system that uses a photovoltaic (PV) heater. A layer of paraffin wax weighing 15 kg as a phase change material (Paraffin wax) was found at the bottom of the solar still's down basin. Research into the system has been conducted to assess its effectiveness at improving freshwater. Solar rays and a direct current (DC) water heater were used to preheat the saltwater. Surfaces that collect condensation vapor were planned for, such as the single glass lid on top and the bottom of two stacked trays. The purpose of doing so is to make freshwater production more efficient by lowering the resistance of condensation. The extreme heat of the glass cover was reduced by using velocity of cooling water shower. The flow velocity of the shower's cooling water, the impact of the heater, and the depth of lower basin water are all factors included in the research. Solar radiation, paraffin wax, heater input heat found to be proportionate in the innovative solar desalination. An astounding 18 liters per day of distilled water may be generated by the Multiple Stage Effect Photovoltaic Heater (MSEPVH). Both mathematical modelling and experimental were used to calculate the maximum possible cooling water flow rate, the total amount of freshwater, and the effectiveness of MSEPVH on the best possible day.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125290153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212266
Gunji Prem Prasad, G. Kathrine, Jemimah M Kuruvilla, Mohammed Moosa Razeek J
This research study intends to explore various challenges that humans have encountered as well as any that may arise in the near future. Poor sanitation facility is one of the main causes of malnutrition and it leads to a number of diseases, which also indirectly impacts other sectors. Excessive use of resources that are not renewable is another considerable issue. There is a lot of energy resource wastage; for example, streetlights in cities and on highways are often left ON during the day, this may cause energy wastage. Also, it is already known fact that the non-renewable energy resources are very limited. Therefore, an alternative energy source such as renewable energy like wind, solar power, and others are required. In future there might be a rise in the electricity consumption, therefore some innovative ways should be developed to fulfill the requirements. Through innovative technologies, energy can be efficiently utilized. IIoT aims to automate system-based monitoring and control of devices. Integrating the use of renewable energy and leveraging technology in the sanitation sector will promote social development.
{"title":"Implementation of Industry 4.0 in the Energy Sector","authors":"Gunji Prem Prasad, G. Kathrine, Jemimah M Kuruvilla, Mohammed Moosa Razeek J","doi":"10.1109/ICECAA58104.2023.10212266","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212266","url":null,"abstract":"This research study intends to explore various challenges that humans have encountered as well as any that may arise in the near future. Poor sanitation facility is one of the main causes of malnutrition and it leads to a number of diseases, which also indirectly impacts other sectors. Excessive use of resources that are not renewable is another considerable issue. There is a lot of energy resource wastage; for example, streetlights in cities and on highways are often left ON during the day, this may cause energy wastage. Also, it is already known fact that the non-renewable energy resources are very limited. Therefore, an alternative energy source such as renewable energy like wind, solar power, and others are required. In future there might be a rise in the electricity consumption, therefore some innovative ways should be developed to fulfill the requirements. Through innovative technologies, energy can be efficiently utilized. IIoT aims to automate system-based monitoring and control of devices. Integrating the use of renewable energy and leveraging technology in the sanitation sector will promote social development.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123812741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ethereum, a leading cryptocurrency, is advancing the way we handle digital transactions. One important concept in Ethereum is “account abstraction,” which could play a crucial role in making it accessible to a wider audience. Currently, Ethereum has two types of accounts: externally owned accounts (EOAs) and contract accounts (CAs). EOAs are controlled by a public address and private key, allowing users to initiate transactions and interact with smart contracts. However, losing the private key can result in the loss of funds, and EOAs are not quantum safe. On the other hand, CAs are controlled by the code written on the Ethereum Virtual Machine (EVM) and do not possess private keys. They rely on network storage, and their creation incurs a cost. To enhance the existing technology and make it more user-friendly, there is a proposal for “account abstraction” in the Ethereum protocol. This change would enable users to interact with smart contracts using smart contract wallets instead of externally owned accounts. This would bring greater flexibility and security to the management of user accounts, as well as open doors for new and innovative user experiences.
{"title":"Account Abstraction via Singleton Entrypoint Contract and Verifying Paymaster","authors":"Aniket Kumar Singh, Inzimam Ul Hassan, Gaganjot Kaur, Shanu Kumar, Anmol","doi":"10.1109/ICECAA58104.2023.10212316","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212316","url":null,"abstract":"Ethereum, a leading cryptocurrency, is advancing the way we handle digital transactions. One important concept in Ethereum is “account abstraction,” which could play a crucial role in making it accessible to a wider audience. Currently, Ethereum has two types of accounts: externally owned accounts (EOAs) and contract accounts (CAs). EOAs are controlled by a public address and private key, allowing users to initiate transactions and interact with smart contracts. However, losing the private key can result in the loss of funds, and EOAs are not quantum safe. On the other hand, CAs are controlled by the code written on the Ethereum Virtual Machine (EVM) and do not possess private keys. They rely on network storage, and their creation incurs a cost. To enhance the existing technology and make it more user-friendly, there is a proposal for “account abstraction” in the Ethereum protocol. This change would enable users to interact with smart contracts using smart contract wallets instead of externally owned accounts. This would bring greater flexibility and security to the management of user accounts, as well as open doors for new and innovative user experiences.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121529887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}