Pub Date : 2021-12-01DOI: 10.1109/ComPE53109.2021.9752064
S. P., Kaviya J, M. S, Madhumitha S T, Rajeshwari M, Devipriya N, Aswitha B B, Devi R
Fuzzy controlled landsman converter employed for pumping application is presented here. Landsman converter(LC) is designed using voltage multiplier cell which makes the converter from reduced switching voltages. The controller is designed with Fuzzy logic to derive constant voltage output irrespective of variation of input of the converter. The input to the converter is fed from solar panel(250W). The DC output voltage of converter is fed to the electrical machine to run for different pumping applications. The design of controller and converter is analyzed using MATLAB.
{"title":"Fuzzy Based Landsman Converter For Pumping Application","authors":"S. P., Kaviya J, M. S, Madhumitha S T, Rajeshwari M, Devipriya N, Aswitha B B, Devi R","doi":"10.1109/ComPE53109.2021.9752064","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752064","url":null,"abstract":"Fuzzy controlled landsman converter employed for pumping application is presented here. Landsman converter(LC) is designed using voltage multiplier cell which makes the converter from reduced switching voltages. The controller is designed with Fuzzy logic to derive constant voltage output irrespective of variation of input of the converter. The input to the converter is fed from solar panel(250W). The DC output voltage of converter is fed to the electrical machine to run for different pumping applications. The design of controller and converter is analyzed using MATLAB.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114746449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ComPE53109.2021.9752428
Savita Yadav, P. Chakraborty, Karan Jain, Jyotirmaya
Smartphones are popular among children. Children aged seven years and more often play with car racing themed mobile apps which are harmful for them. This paper uses a User Centered Design approach with children as informants of the design to develop an app named Safe Driving App for children. The app aims to spread awareness among children about the importance of following traffic rules. An analysis of the usage pattern and a post hoc interview revealed that children require less time to complete a game in the app (P < 0.05) but become less satisfied with it (P < 0.05) as they grow up. On the basis of the results, it is recommended that mobile apps for children should be developed as per the requirements and interests of the children of different age groups to facilitate better comprehension and provide adequate leaning opportunities for them.
{"title":"A User Centered Design Approach to Develop a Mobile App for Children","authors":"Savita Yadav, P. Chakraborty, Karan Jain, Jyotirmaya","doi":"10.1109/ComPE53109.2021.9752428","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752428","url":null,"abstract":"Smartphones are popular among children. Children aged seven years and more often play with car racing themed mobile apps which are harmful for them. This paper uses a User Centered Design approach with children as informants of the design to develop an app named Safe Driving App for children. The app aims to spread awareness among children about the importance of following traffic rules. An analysis of the usage pattern and a post hoc interview revealed that children require less time to complete a game in the app (P < 0.05) but become less satisfied with it (P < 0.05) as they grow up. On the basis of the results, it is recommended that mobile apps for children should be developed as per the requirements and interests of the children of different age groups to facilitate better comprehension and provide adequate leaning opportunities for them.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127156155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ComPE53109.2021.9752023
Hema Priya.N, Adithya Harish S M, S. S, P. Rathika
Data leakage is the intentional or unintended transmission of stable or personal data to outside recipient. Such leakage in mobile community increases the chance of compilation. Hence encryption and storage of the secure data must be accomplished by usage of a few techniques. Federated learning (FL), which falls under distributed machine learning, helps preserve clients’ private data on various device as the centralized model receives only weight updates. Sensitive private data is open for access by analyzing submitted attributes from clients using techniques like weights developed in deep neural networks. To effectively preserve statistics from leakage, this study analyzes a novel framework using differential privacy (DP), in which synthetic noises are provided to parameters on the customers' side prior to aggregation, FLAGnoise (FL with noise aggregated).The system analyses the dataset consisting of information about the client. Federated learning with Advanced Encryption Standard (AES) algorithm and Differential privacy is then applied. It is found that the Federated learning model have better privacy than the Differential privacy model and gives the accuracy of 97.3%.
{"title":"Improving Security with Federated Learning","authors":"Hema Priya.N, Adithya Harish S M, S. S, P. Rathika","doi":"10.1109/ComPE53109.2021.9752023","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752023","url":null,"abstract":"Data leakage is the intentional or unintended transmission of stable or personal data to outside recipient. Such leakage in mobile community increases the chance of compilation. Hence encryption and storage of the secure data must be accomplished by usage of a few techniques. Federated learning (FL), which falls under distributed machine learning, helps preserve clients’ private data on various device as the centralized model receives only weight updates. Sensitive private data is open for access by analyzing submitted attributes from clients using techniques like weights developed in deep neural networks. To effectively preserve statistics from leakage, this study analyzes a novel framework using differential privacy (DP), in which synthetic noises are provided to parameters on the customers' side prior to aggregation, FLAGnoise (FL with noise aggregated).The system analyses the dataset consisting of information about the client. Federated learning with Advanced Encryption Standard (AES) algorithm and Differential privacy is then applied. It is found that the Federated learning model have better privacy than the Differential privacy model and gives the accuracy of 97.3%.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128107662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ComPE53109.2021.9752358
Rohani Rohan, Suree Funilkul, Debajyoti Pal, W. Chutimaskul
Cybersecurity is paramount for all public and private sectors for protecting their information systems, data, and digital assets from cyber-attacks; thus, relying on technology-based protections alone will not achieve this goal. This work examines the role of human factors in cybersecurity by looking at the top-tier conference on Human Factors in Cybersecurity over the past 6 years. A total of 24 articles were selected for the final analysis. Findings show that most of the authors used a quantitative method, where survey was the most used tool for collecting the data, and less attention has been paid to the theoretical research. Besides, three types of users were identified: university-level users, organizational-level users, and unspecified users. Culture is another less investigated aspect, and the samples were biased towards the western community. Moreover, 17 human factors are identified; human awareness, privacy perception, trust perception, behavior, and capability are the top five among them. Also, new insights and recommendations are presented.
{"title":"Understanding of Human Factors in Cybersecurity: A Systematic Literature Review","authors":"Rohani Rohan, Suree Funilkul, Debajyoti Pal, W. Chutimaskul","doi":"10.1109/ComPE53109.2021.9752358","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752358","url":null,"abstract":"Cybersecurity is paramount for all public and private sectors for protecting their information systems, data, and digital assets from cyber-attacks; thus, relying on technology-based protections alone will not achieve this goal. This work examines the role of human factors in cybersecurity by looking at the top-tier conference on Human Factors in Cybersecurity over the past 6 years. A total of 24 articles were selected for the final analysis. Findings show that most of the authors used a quantitative method, where survey was the most used tool for collecting the data, and less attention has been paid to the theoretical research. Besides, three types of users were identified: university-level users, organizational-level users, and unspecified users. Culture is another less investigated aspect, and the samples were biased towards the western community. Moreover, 17 human factors are identified; human awareness, privacy perception, trust perception, behavior, and capability are the top five among them. Also, new insights and recommendations are presented.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121882187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ComPE53109.2021.9752040
Samir Rana, L. Gopal, Neha Gupta
By 2050, almost 70% of the total world population is estimated to migrate to urban areas. To accommodate such a large population, the need to build smart cities all over the world is the need of the hour. To accomplish this goal, a lot of work needs to be done in the fields of various smart city concepts for better management of resources and to reduce the problems faced by the public in general. With this vision, many researchers around the world are working to build up efficient technologies, that would make the concept of smart cities feasible. In this direction, some technologies, like ambient intelligence, etc. exist but are not coupled with the Internet. On the other hand, the Internet of Things (IoT) is an emerging technique, that is tightly coupled with the Internet. This makes IoT one of the popular techniques to implement the concept of smart cities easily and efficiently, and various applications of IoT are capable of formulating the concept of smart cities into existence. This paper focuses on a detailed survey of smart city concepts, features, and the role of IoT in building smart cities.
{"title":"Smart City Concepts, Features and the Role of Internet of Things: A Review","authors":"Samir Rana, L. Gopal, Neha Gupta","doi":"10.1109/ComPE53109.2021.9752040","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752040","url":null,"abstract":"By 2050, almost 70% of the total world population is estimated to migrate to urban areas. To accommodate such a large population, the need to build smart cities all over the world is the need of the hour. To accomplish this goal, a lot of work needs to be done in the fields of various smart city concepts for better management of resources and to reduce the problems faced by the public in general. With this vision, many researchers around the world are working to build up efficient technologies, that would make the concept of smart cities feasible. In this direction, some technologies, like ambient intelligence, etc. exist but are not coupled with the Internet. On the other hand, the Internet of Things (IoT) is an emerging technique, that is tightly coupled with the Internet. This makes IoT one of the popular techniques to implement the concept of smart cities easily and efficiently, and various applications of IoT are capable of formulating the concept of smart cities into existence. This paper focuses on a detailed survey of smart city concepts, features, and the role of IoT in building smart cities.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121991050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ComPE53109.2021.9752138
Renuka Sharma, K. Mehta, Ochin Sharma
Time series data and its analysis is a challenging task as data kept changing continuously and based upon the new data arriving, the previous analysis might often seem obsolete. Time series data is time-ordered datasets, which is a more advanced area of data analysis. When evaluating a time series, many aspects must be considered, that can be used to help the explain time series. To analyse time series data accurately and rapidly, deep learning is quite helpful. Further, deep learning is also abiding with a couple of challenges, as there are several activation functions, loss functions, optimizers, number of deep layers. In this paper, experimentally, the various parameters of deep learning would be testing upon time series data to determine the optimal environment for stock prediction analysis.
{"title":"Exploring Deep Learning to Determine the Optimal Environment for Stock Prediction Analysis","authors":"Renuka Sharma, K. Mehta, Ochin Sharma","doi":"10.1109/ComPE53109.2021.9752138","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752138","url":null,"abstract":"Time series data and its analysis is a challenging task as data kept changing continuously and based upon the new data arriving, the previous analysis might often seem obsolete. Time series data is time-ordered datasets, which is a more advanced area of data analysis. When evaluating a time series, many aspects must be considered, that can be used to help the explain time series. To analyse time series data accurately and rapidly, deep learning is quite helpful. Further, deep learning is also abiding with a couple of challenges, as there are several activation functions, loss functions, optimizers, number of deep layers. In this paper, experimentally, the various parameters of deep learning would be testing upon time series data to determine the optimal environment for stock prediction analysis.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ComPE53109.2021.9752051
T. N. Shanavas, Krishna K Bharath, Anglight Sunny, P. M. Anju, Aman Rajeev
Power demand in the modern era is more than ever before but there is the limitation of space availability in densely populated areas. Owing to the less space requirement Gas Insulated Substations (GIS) are expected to dominate the power transmission utility. A gas-insulated substation uses a superior dielectric gas, SF6, at moderate pressure for phase-to-phase and phase-to-ground insulation. The switching events in GIS result in the generation of Very Fast Transient Overvoltages (VFTO). By using PSCAD software, VFTO has been simulated in a 275 kV gas-insulated substation. The GIS components are represented using equivalent circuits. VFTO generated by simulating the switching events is analyzed using STFT and CWT analysis. Mitigation of VFTO using ferrite rings is evaluated by implementing the equivalent model in the substation model.
{"title":"Modeling of 275 kV Gas Insulated Substation and Analysis and Mitigation of Very Fast Transient Overvoltages","authors":"T. N. Shanavas, Krishna K Bharath, Anglight Sunny, P. M. Anju, Aman Rajeev","doi":"10.1109/ComPE53109.2021.9752051","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752051","url":null,"abstract":"Power demand in the modern era is more than ever before but there is the limitation of space availability in densely populated areas. Owing to the less space requirement Gas Insulated Substations (GIS) are expected to dominate the power transmission utility. A gas-insulated substation uses a superior dielectric gas, SF6, at moderate pressure for phase-to-phase and phase-to-ground insulation. The switching events in GIS result in the generation of Very Fast Transient Overvoltages (VFTO). By using PSCAD software, VFTO has been simulated in a 275 kV gas-insulated substation. The GIS components are represented using equivalent circuits. VFTO generated by simulating the switching events is analyzed using STFT and CWT analysis. Mitigation of VFTO using ferrite rings is evaluated by implementing the equivalent model in the substation model.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125035405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ComPE53109.2021.9751810
R. Praveena, T. R. Ganesh Babu, S. Jayanthiswari, S. Ramya, D. Kumaar, J. Rangarajan
The topology of the Internet of Things (IoT) is recently used to gather in customer-centered e-health or consumer health care systems physics, physiology, critical signs from patients. Various medical devices have been connected to patients in these healthcare systems to gather critical signals from those that are tracked. There is an issue of congestion in the data collection process on the Wireless Sensor Network (WSN). The result is a decline in efficiency and loss of the IoT enabled WSN on missed packets. This article suggests the distributed IoT-enabled WSN congestion management algorithm to efficiently overcome convergence in healthcare systems. In its priority data routing policy, the suggested methodology relieves congestion. This paper also provides a priority queue-based schedule for increased reliability. Mathematically, we investigate and test the properties of the proposed congestion reduction system by detailed simulations and real- life experiments. An early warning device can be used to monitor elevated cardiac rhythm, blood pressure, ECG, EMG for state-of-the-art diagnostics in the hospital/home care setting.
{"title":"Framework of IoT Extensive Routing Concentration by using Smart Healthcare Sensing Devices","authors":"R. Praveena, T. R. Ganesh Babu, S. Jayanthiswari, S. Ramya, D. Kumaar, J. Rangarajan","doi":"10.1109/ComPE53109.2021.9751810","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9751810","url":null,"abstract":"The topology of the Internet of Things (IoT) is recently used to gather in customer-centered e-health or consumer health care systems physics, physiology, critical signs from patients. Various medical devices have been connected to patients in these healthcare systems to gather critical signals from those that are tracked. There is an issue of congestion in the data collection process on the Wireless Sensor Network (WSN). The result is a decline in efficiency and loss of the IoT enabled WSN on missed packets. This article suggests the distributed IoT-enabled WSN congestion management algorithm to efficiently overcome convergence in healthcare systems. In its priority data routing policy, the suggested methodology relieves congestion. This paper also provides a priority queue-based schedule for increased reliability. Mathematically, we investigate and test the properties of the proposed congestion reduction system by detailed simulations and real- life experiments. An early warning device can be used to monitor elevated cardiac rhythm, blood pressure, ECG, EMG for state-of-the-art diagnostics in the hospital/home care setting.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123236716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ComPE53109.2021.9752450
Harikishni Nain
This paper seeks to examine students’ behavioral intention to adopt social media learning in education through a unified theory of acceptance and use of technology (UTAUT) model based on data collected from 279 undergraduate students of different colleges of Delhi University, Delhi, India. The results revealed that students’ behavioral intention to use social media learning in education is significantly affected by their perceptions about performance expectancy, effort expectancy, facilitating conditions, and Covid-19 induced social isolation but not by social factors. Out of four moderating variables, the impact of only one variable, i.e., area of residence is found to be most significant across all the relationships studied. Study results are important for the policymakers to incorporate social media tools as an essential part of their future policies for higher education in India, and by extension for educational levels as well.
{"title":"Understanding Students’ Behavioural Intentions To Use Social Media Learning In Education: A Utaut Model Approach","authors":"Harikishni Nain","doi":"10.1109/ComPE53109.2021.9752450","DOIUrl":"https://doi.org/10.1109/ComPE53109.2021.9752450","url":null,"abstract":"This paper seeks to examine students’ behavioral intention to adopt social media learning in education through a unified theory of acceptance and use of technology (UTAUT) model based on data collected from 279 undergraduate students of different colleges of Delhi University, Delhi, India. The results revealed that students’ behavioral intention to use social media learning in education is significantly affected by their perceptions about performance expectancy, effort expectancy, facilitating conditions, and Covid-19 induced social isolation but not by social factors. Out of four moderating variables, the impact of only one variable, i.e., area of residence is found to be most significant across all the relationships studied. Study results are important for the policymakers to incorporate social media tools as an essential part of their future policies for higher education in India, and by extension for educational levels as well.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123839624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}