Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212372
K. Dhivya, S. J, K. Premkumar, K. Balasaranya, S. Dhanalakshmi
An Autonomous Mobile Network (AMN) is a wireless network in which no structure is accessible. AMN has significantly assisted in many applications recently. The AMN is often employed in such environments where humans do not exist. Therefore, each mobile node should be understood in case of a malfunction or connection failure between mobile nodes. Ant colony optimization (ACO) techniques have helped to develop AMN routing. An Untrustworthy mobile node Isolation by applying the Belief Factor (UIBF) system to detects the untrustworthy mobile nodes efficiently. The node energy, node cooperativeness, node packet losses, and node delay measures are combined to compute the belief factor. This mechanism uses the ACO algorithm to choose the optimal route from the sender to the recipient. Simulation results evaluate the UIBF approach to provide a better untrustworthy node detection ratio and raise the throughput with minimum network delay.
{"title":"Untrustworthy Mobile Node Isolation by Belief Factor in Autonomous Mobile Network","authors":"K. Dhivya, S. J, K. Premkumar, K. Balasaranya, S. Dhanalakshmi","doi":"10.1109/ICECAA58104.2023.10212372","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212372","url":null,"abstract":"An Autonomous Mobile Network (AMN) is a wireless network in which no structure is accessible. AMN has significantly assisted in many applications recently. The AMN is often employed in such environments where humans do not exist. Therefore, each mobile node should be understood in case of a malfunction or connection failure between mobile nodes. Ant colony optimization (ACO) techniques have helped to develop AMN routing. An Untrustworthy mobile node Isolation by applying the Belief Factor (UIBF) system to detects the untrustworthy mobile nodes efficiently. The node energy, node cooperativeness, node packet losses, and node delay measures are combined to compute the belief factor. This mechanism uses the ACO algorithm to choose the optimal route from the sender to the recipient. Simulation results evaluate the UIBF approach to provide a better untrustworthy node detection ratio and raise the throughput with minimum network delay.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"84 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125924466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Robots are more effective and efficient than people at doing every chore around the house. The goal of this research is to demonstrate a prototype of an autonomous robot that can deliver meals to hotel guests. To save time and money, the sample is used with the resources that are already available. Smart menu cards that can be touched are taking their place. The proposed line-following robot is made with sensor-controlled motors that follow a pre-set line plan so that meals can be handed out. The aim is to create a robot that can effectively serve humans in public settings. The robot can be summoned by toggling a switch on the user's desk. Bluetooth is the foundation of the entire system.
{"title":"Next Generation Electronic Waiter: Wireless Menu Ordering & Serving Robot","authors":"Shubham Chavan, Prasad Chaudhari, Kunal Gade, Kunal Sharma Dr, M.Sujith Dr, D.B.Pardeshi","doi":"10.1109/icecaa58104.2023.10212321","DOIUrl":"https://doi.org/10.1109/icecaa58104.2023.10212321","url":null,"abstract":"Robots are more effective and efficient than people at doing every chore around the house. The goal of this research is to demonstrate a prototype of an autonomous robot that can deliver meals to hotel guests. To save time and money, the sample is used with the resources that are already available. Smart menu cards that can be touched are taking their place. The proposed line-following robot is made with sensor-controlled motors that follow a pre-set line plan so that meals can be handed out. The aim is to create a robot that can effectively serve humans in public settings. The robot can be summoned by toggling a switch on the user's desk. Bluetooth is the foundation of the entire system.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126173760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212183
D.Wishma, S.Gayathri, C. Viknesh, R.Seetharaman
Skin cancer is caused by unrepaired DNA damage to the epidermis, the top layer of skin, which results in mutations and uncontrollable cell proliferation of abnormal cells. Skin cells undergo modification, proliferate rapidly, and transform into malignant tumors as a result. Squamous cell carcinoma, melanoma, and basal cell carcinoma are the three most prevalent kinds of skin cancer. The first two types of skin cancer as well as a few additional less common types are collectively referred to as non-melanoma skin cancer. The size, shape, or color of a mole changes, or it bleeds or itches. Its margins could also be discolored or uneven. Melanoma is the most dangerous type of cancer. In 90% of cases, exposure to the sun's UV rays is to blame. This exposure increases the risk of acquiring any of the three primary kinds of skin cancer. Skin cancer is brought on by unbalanced sunburn cells carried on by continuous UVB exposure. In order to prevent harm, UV intensity is measured and safety precautions are performed for the corresponding intensity. Here is a methodological approach for using a mobile application to diagnose melanoma using dermoscopy images.
{"title":"Diagnosis of Melanoma by Analysing UV-Ray Intensity and Dermoscopy Images Through Mobile Application","authors":"D.Wishma, S.Gayathri, C. Viknesh, R.Seetharaman","doi":"10.1109/ICECAA58104.2023.10212183","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212183","url":null,"abstract":"Skin cancer is caused by unrepaired DNA damage to the epidermis, the top layer of skin, which results in mutations and uncontrollable cell proliferation of abnormal cells. Skin cells undergo modification, proliferate rapidly, and transform into malignant tumors as a result. Squamous cell carcinoma, melanoma, and basal cell carcinoma are the three most prevalent kinds of skin cancer. The first two types of skin cancer as well as a few additional less common types are collectively referred to as non-melanoma skin cancer. The size, shape, or color of a mole changes, or it bleeds or itches. Its margins could also be discolored or uneven. Melanoma is the most dangerous type of cancer. In 90% of cases, exposure to the sun's UV rays is to blame. This exposure increases the risk of acquiring any of the three primary kinds of skin cancer. Skin cancer is brought on by unbalanced sunburn cells carried on by continuous UVB exposure. In order to prevent harm, UV intensity is measured and safety precautions are performed for the corresponding intensity. Here is a methodological approach for using a mobile application to diagnose melanoma using dermoscopy images.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126376685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research study aims to generate a database in verification phase of a chip in the post silicon era. The database is generated through an automated script which automates the retrieval of all the testing data associated with the chip cores and domains. In this work, scripting automation for generation of QSCAN database is developed to eliminate the manual maintenance which are prone to errors and are highly tedious. Automation scripts are developed using Perl language. Separate scripts are developed for stuck-at-faults and transition delay faults. The database is generated with configuration file containing the test patterns, its directories and other identities of the chip, marker files and validation files which has the files expressing the successful validation details of a chip. The database incorporates information on all the instances of a chip.
{"title":"Programming Routine Tasks Utilizing Scripting Automation in Generation of QSCAN Database","authors":"M.Thilagaraj, Kottaimalai Ramaraj, C.S.Sundar Ganesh, T.Vadivelan","doi":"10.1109/ICECAA58104.2023.10212198","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212198","url":null,"abstract":"This research study aims to generate a database in verification phase of a chip in the post silicon era. The database is generated through an automated script which automates the retrieval of all the testing data associated with the chip cores and domains. In this work, scripting automation for generation of QSCAN database is developed to eliminate the manual maintenance which are prone to errors and are highly tedious. Automation scripts are developed using Perl language. Separate scripts are developed for stuck-at-faults and transition delay faults. The database is generated with configuration file containing the test patterns, its directories and other identities of the chip, marker files and validation files which has the files expressing the successful validation details of a chip. The database incorporates information on all the instances of a chip.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127333414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212218
P. Latha, Victoria Jancee, K. Kaviyarasan, S. Aghalya, J. Martin, L. Manickam
This research study intends to develop a novel method for identifying over-current or fault-current concerns in appliances and electronics used in the home or industry, such as battery and chargers is discussed. The system monitors electrical circuits in real-time, detects faults, and alerts appropriate parties through sound alarms and email notifications. The system may be configured according to individual defect detection needs. The NIOS II (Altera DE2 EDK) processor controls the numerous components and processes and analyzes data. To properly monitor electrical characteristics, voltage, and current sensors are added into the system. The NIOS II processor continually monitors observed data and compares them to specified threshold levels. An alarm sounds if voltage or current exceeds the thresholds, communicating an issue or abnormal situation. Through IoT server connectivity, the system sends email notifications in addition to the sound alert. An email notice is sent to a predetermined email address when a fault condition is detected, providing remote monitoring and quick information about the fault occurrence. The system's benefits include reconfigurability, monitoring in real-time, alarm alerting, remote email notification, safety, and customization.
本研究旨在开发一种新的方法来识别家庭或工业中使用的电器和电子产品中的过流或故障电流问题,例如电池和充电器。系统对电路进行实时监控,及时发现故障,并通过声音报警、邮件通知等方式向相关方发出警报。系统可以根据单个缺陷检测的需要进行配置。NIOS II (Altera DE2 EDK)处理器控制众多组件和进程并分析数据。为了正确地监控电气特性,在系统中添加了电压和电流传感器。NIOS II处理器持续监视观察到的数据,并将它们与指定的阈值水平进行比较。当电压或电流超过阈值时发出告警,提示存在问题或异常情况。通过物联网服务器连接,系统除了发出声音警报外,还会发送电子邮件通知。当检测到故障情况时,通过邮件通知的方式发送到指定邮箱,实现远程监控和快速了解故障发生情况。该系统的优点包括可重构性、实时监控、警报警报、远程电子邮件通知、安全性和可定制性。
{"title":"Reconfigurable Fault Current Detection System Using IoT","authors":"P. Latha, Victoria Jancee, K. Kaviyarasan, S. Aghalya, J. Martin, L. Manickam","doi":"10.1109/ICECAA58104.2023.10212218","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212218","url":null,"abstract":"This research study intends to develop a novel method for identifying over-current or fault-current concerns in appliances and electronics used in the home or industry, such as battery and chargers is discussed. The system monitors electrical circuits in real-time, detects faults, and alerts appropriate parties through sound alarms and email notifications. The system may be configured according to individual defect detection needs. The NIOS II (Altera DE2 EDK) processor controls the numerous components and processes and analyzes data. To properly monitor electrical characteristics, voltage, and current sensors are added into the system. The NIOS II processor continually monitors observed data and compares them to specified threshold levels. An alarm sounds if voltage or current exceeds the thresholds, communicating an issue or abnormal situation. Through IoT server connectivity, the system sends email notifications in addition to the sound alert. An email notice is sent to a predetermined email address when a fault condition is detected, providing remote monitoring and quick information about the fault occurrence. The system's benefits include reconfigurability, monitoring in real-time, alarm alerting, remote email notification, safety, and customization.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"325-326 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127685850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212283
Shally Vats, Pratham Jain, Devesh Baranwal
High demand for cloud computing resources has given rise to the enormous size of cloud data centers. Consequently, the energy demand for cloud resources has increased. This is high time to put a check on energy consumption to make cloud computing more profitable for the cloud service provider and to defend the environment from carbon footprint. In this paper, a method has been proposed to allocate the resources to the coming tasks in an energy efficient manner. The proposed method of host selection for VM consolidation is successful in the reduction of energy consumption and maintaining the SLA violations low.
{"title":"A New Dynamic Threshold Based Energy Saver Resource Allocation method for Cloud Infrastructure","authors":"Shally Vats, Pratham Jain, Devesh Baranwal","doi":"10.1109/ICECAA58104.2023.10212283","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212283","url":null,"abstract":"High demand for cloud computing resources has given rise to the enormous size of cloud data centers. Consequently, the energy demand for cloud resources has increased. This is high time to put a check on energy consumption to make cloud computing more profitable for the cloud service provider and to defend the environment from carbon footprint. In this paper, a method has been proposed to allocate the resources to the coming tasks in an energy efficient manner. The proposed method of host selection for VM consolidation is successful in the reduction of energy consumption and maintaining the SLA violations low.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212135
M. Arumugam, Snegaa S R, C. Jayanthi
Sentimental analysis is a crucial step in natural language processing that aids in figuring out whether a text has a positive, negative, or neutral sentiment. In this experiment, we analyzed the sentiments expressed in tweets that included text, emojis, and emoticons. To categorize the tweets into different sentiments, we utilized four different algorithms: Multinomial Naive Bayes (MNB),Random Forest, Support Vector Machine (SVM) and Decision Tree. In order to increase the model's accuracy, we also combined the predictions from the four algorithms using the Voting Classifier, an ensemble learning technique. To preprocess the data, we used various techniques, such as removing stop words, stemming, and converting emojis and emoticons to their corresponding text representations. The performance of each algorithm was then trained on the preprocessed data using various assessment measures, including accuracy, precision, F1-score and recall. The SVM method fared better than the other algorithms, obtaining an accuracy of 96.27%, according to the data. Furthermore, we applied ensemble learning techniques, such as bagging to improve the performance of all the four algorithms. We also used the Voting Classifier to combine the predictions of the bagging models to further improve the accuracy of the model. The results revealed that the accuracy was increased to 97.21% by combining the bagging and voting classifiers. Overall, the project demonstrates the effectiveness of various algorithms and ensemble learning methods in performing sentimental analysis on tweets containing text, emojis, and emoticons.
{"title":"Machine Learning for Sentiment Analysis Utilizing Social Media","authors":"M. Arumugam, Snegaa S R, C. Jayanthi","doi":"10.1109/ICECAA58104.2023.10212135","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212135","url":null,"abstract":"Sentimental analysis is a crucial step in natural language processing that aids in figuring out whether a text has a positive, negative, or neutral sentiment. In this experiment, we analyzed the sentiments expressed in tweets that included text, emojis, and emoticons. To categorize the tweets into different sentiments, we utilized four different algorithms: Multinomial Naive Bayes (MNB),Random Forest, Support Vector Machine (SVM) and Decision Tree. In order to increase the model's accuracy, we also combined the predictions from the four algorithms using the Voting Classifier, an ensemble learning technique. To preprocess the data, we used various techniques, such as removing stop words, stemming, and converting emojis and emoticons to their corresponding text representations. The performance of each algorithm was then trained on the preprocessed data using various assessment measures, including accuracy, precision, F1-score and recall. The SVM method fared better than the other algorithms, obtaining an accuracy of 96.27%, according to the data. Furthermore, we applied ensemble learning techniques, such as bagging to improve the performance of all the four algorithms. We also used the Voting Classifier to combine the predictions of the bagging models to further improve the accuracy of the model. The results revealed that the accuracy was increased to 97.21% by combining the bagging and voting classifiers. Overall, the project demonstrates the effectiveness of various algorithms and ensemble learning methods in performing sentimental analysis on tweets containing text, emojis, and emoticons.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212245
P. Ramya, C.P. Gowtham, S. K. Kumar, T. P. Silpica, P. Renugadevi
Nowadays giving fair verdict is a quite challenging task because of certain contentious aspects in modern cricket. So, in order to avoid making wrong decisions, we develop an automated AI-based solution. This project focus on a technology that helps both the main umpire and third umpire to makes critical determination for Leg Before the Wicket (LBW) regarding whether the batsman is out or not-out and also minimizes the waiting time for players until the third umpire go through the trajectory of the ball to make a correct decision. The main purpose of our AI-DRS is to remove the umpires call which plays a vital role in giving third umpires decision because whether any one of the cases shows umpires call the decision will be stick with on-field umpires call whether it may be out or not-out. The pitch report and comprehensive cricket laws are also included for the sake of the game. The pitch report will be examined with several key wicket characteristics, such as kind of soil, cracks, amount of grass cover, and wetness, etc. using drone we capture the video of the match day pitch. To determine the field crack, canny edge detection is performed and soil moisture sensor is used to determine the moisture content of the soil. This information help cricket team to make a decision about whether to bat or field after winning the toss and helps to choose the strongest 11 players through which can win the match on that pitch on that day. Utilizing support vector machine (SVM) and histograms of gradients (HOG), objects are classified and recognized. In order to monitor and forecast the velocity of the ball, linear regression and quadratic regression are applied. Finally, Tkinter is used for GUI development, imutils and OpenCV are used as implementation tools. Due to the controversy of rare wicket calls, boundary and penalty runs, we bring a voice recognized AI system which gave fans to easily understand why this decision is made by the umpire and sometime umpires found difficulty to remember some rules which is rarely used in cricket it will also give assist to on-field umpires to give a very clear idea why he made the decision, the on-field umpires can easily access the laws through voice recognition which use Alan-AI. The Voice recognition web app was developed using react-js.
{"title":"A Customisable AI Deck for Pitch Reports and Automated III Umpire Decision Review System DRS","authors":"P. Ramya, C.P. Gowtham, S. K. Kumar, T. P. Silpica, P. Renugadevi","doi":"10.1109/ICECAA58104.2023.10212245","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212245","url":null,"abstract":"Nowadays giving fair verdict is a quite challenging task because of certain contentious aspects in modern cricket. So, in order to avoid making wrong decisions, we develop an automated AI-based solution. This project focus on a technology that helps both the main umpire and third umpire to makes critical determination for Leg Before the Wicket (LBW) regarding whether the batsman is out or not-out and also minimizes the waiting time for players until the third umpire go through the trajectory of the ball to make a correct decision. The main purpose of our AI-DRS is to remove the umpires call which plays a vital role in giving third umpires decision because whether any one of the cases shows umpires call the decision will be stick with on-field umpires call whether it may be out or not-out. The pitch report and comprehensive cricket laws are also included for the sake of the game. The pitch report will be examined with several key wicket characteristics, such as kind of soil, cracks, amount of grass cover, and wetness, etc. using drone we capture the video of the match day pitch. To determine the field crack, canny edge detection is performed and soil moisture sensor is used to determine the moisture content of the soil. This information help cricket team to make a decision about whether to bat or field after winning the toss and helps to choose the strongest 11 players through which can win the match on that pitch on that day. Utilizing support vector machine (SVM) and histograms of gradients (HOG), objects are classified and recognized. In order to monitor and forecast the velocity of the ball, linear regression and quadratic regression are applied. Finally, Tkinter is used for GUI development, imutils and OpenCV are used as implementation tools. Due to the controversy of rare wicket calls, boundary and penalty runs, we bring a voice recognized AI system which gave fans to easily understand why this decision is made by the umpire and sometime umpires found difficulty to remember some rules which is rarely used in cricket it will also give assist to on-field umpires to give a very clear idea why he made the decision, the on-field umpires can easily access the laws through voice recognition which use Alan-AI. The Voice recognition web app was developed using react-js.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122515119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-19DOI: 10.1109/ICECAA58104.2023.10212301
G. Indra, B. P. Kumar, G. H. Kumar, Mr. B. Srikanth
Media influence's public opinion and decision-making today. Advertisements especially affect audience perceptions, actions, and purchases. A comprehensive data library on commercials and their performance is needed to understand how media affects society. Ad content, placement, and performance are stored in a data warehouse-based ad archive. The archive can evaluate marketing campaigns and discover media trends. Ad servers, social media platforms, and media monitoring tools may build the data warehouse-based ad archive. A dimensional data model helps retrieve and analyze data. Structured Query Language (SQL) queries, Online Analytical Processing (OLAP) cubes, and data visualization tools may access the archive. Media academics, marketers, and politicians may study the media environment using the data warehouse-based ad archive. Media academics may utilize the collection to study the marketing campaigns, media trends and media's influence on society. The archive may help advertisers analyze their ad campaigns, optimize media placement, and understand their target demographic. Policymakers may use the archive to monitor media outlets' advertising compliance and assess policy changes' media landscape effects.
{"title":"Data Warehouse-Based Ad Archive for Media Analysis","authors":"G. Indra, B. P. Kumar, G. H. Kumar, Mr. B. Srikanth","doi":"10.1109/ICECAA58104.2023.10212301","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212301","url":null,"abstract":"Media influence's public opinion and decision-making today. Advertisements especially affect audience perceptions, actions, and purchases. A comprehensive data library on commercials and their performance is needed to understand how media affects society. Ad content, placement, and performance are stored in a data warehouse-based ad archive. The archive can evaluate marketing campaigns and discover media trends. Ad servers, social media platforms, and media monitoring tools may build the data warehouse-based ad archive. A dimensional data model helps retrieve and analyze data. Structured Query Language (SQL) queries, Online Analytical Processing (OLAP) cubes, and data visualization tools may access the archive. Media academics, marketers, and politicians may study the media environment using the data warehouse-based ad archive. Media academics may utilize the collection to study the marketing campaigns, media trends and media's influence on society. The archive may help advertisers analyze their ad campaigns, optimize media placement, and understand their target demographic. Policymakers may use the archive to monitor media outlets' advertising compliance and assess policy changes' media landscape effects.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In many WSN applications, such as environmental monitoring and surveillance, the drain node may be a mobile vehicle or a moving robot that moves around the network to collect data from the sensors. In this context, Drain Announcements Based Routing (DABR) and Mobile-drain Routing (MDR) are two efficient routing protocols that can address the challenges of routing in such networks. Both DABR and MDR have been evaluated in various scenarios and have shown promising results in terms of energy efficiency and packet delivery ratio. These protocols can be further optimized for specific WSN applications and network configurations. In conclusion, efficient routing in WSNs with static and moving drains is an active area of research, and protocols such as DABR and MDR can significantly improve the performance of such networks. This section presents the performance evaluation of the proposed DABR and MRLG protocols using the IEEE 802.15.4 technology under different conditions.
{"title":"Performance evaluation of the proposed DABR and MRLG protocols using the IEEE 802.15.4","authors":"Chitra Kiran.N, Pratik Gite, Bhuvaneswari Balachander, Devashree S. Marotkar, Naitik St, Vikas Tripathi","doi":"10.1109/ICECAA58104.2023.10212361","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212361","url":null,"abstract":"In many WSN applications, such as environmental monitoring and surveillance, the drain node may be a mobile vehicle or a moving robot that moves around the network to collect data from the sensors. In this context, Drain Announcements Based Routing (DABR) and Mobile-drain Routing (MDR) are two efficient routing protocols that can address the challenges of routing in such networks. Both DABR and MDR have been evaluated in various scenarios and have shown promising results in terms of energy efficiency and packet delivery ratio. These protocols can be further optimized for specific WSN applications and network configurations. In conclusion, efficient routing in WSNs with static and moving drains is an active area of research, and protocols such as DABR and MDR can significantly improve the performance of such networks. This section presents the performance evaluation of the proposed DABR and MRLG protocols using the IEEE 802.15.4 technology under different conditions.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122997899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}