Pub Date : 2022-12-14DOI: 10.1109/IC3I56241.2022.10073373
Preety Sharma, Rati Sharma
Daily mhealth is among the most frequent and challenging duty in wireless body sensor networking Wsns tech. A low surface oral bioavailability (SAR) value and excellent communication in a sensor system are the main objectives of the important applications. With its distinctive shapes and great discoveries, an antenna has become one of the most popular types of communication devices in the digital age. The design strategy is suitable for adding a new parallel F1 slot to a wearable applications patch antennas UWB microstrip antennas. The antenna been generated using a higher stability simulator employing a textile substrate made of denim. The developed antenna has a 4dB permissible gain and resonates @7.7GHz. Heterodyne measurements of the reflection coefficient revealed that the antenna had such a decent return loss, improved spectrum, high VSWR of 1.05, and a concentration rate SAR number of less than 2W. The result demonstrates that the suggested design complies only with specifications for a cotton wearable antenna in use for continuous healthcare monitoring in the wireless body area net, sports, or commercial applications.
{"title":"LTE Networks with Horizontal T-shaped Patch Antenna for Wearable Medical Devices","authors":"Preety Sharma, Rati Sharma","doi":"10.1109/IC3I56241.2022.10073373","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073373","url":null,"abstract":"Daily mhealth is among the most frequent and challenging duty in wireless body sensor networking Wsns tech. A low surface oral bioavailability (SAR) value and excellent communication in a sensor system are the main objectives of the important applications. With its distinctive shapes and great discoveries, an antenna has become one of the most popular types of communication devices in the digital age. The design strategy is suitable for adding a new parallel F1 slot to a wearable applications patch antennas UWB microstrip antennas. The antenna been generated using a higher stability simulator employing a textile substrate made of denim. The developed antenna has a 4dB permissible gain and resonates @7.7GHz. Heterodyne measurements of the reflection coefficient revealed that the antenna had such a decent return loss, improved spectrum, high VSWR of 1.05, and a concentration rate SAR number of less than 2W. The result demonstrates that the suggested design complies only with specifications for a cotton wearable antenna in use for continuous healthcare monitoring in the wireless body area net, sports, or commercial applications.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131607676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-14DOI: 10.1109/IC3I56241.2022.10072726
Yogesh Kumar Sharma, Syed Shagufta Noval, Arpit Jain, B. Sabitha, T. Ramya
Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media. It is the most intricate step of the cybercrime investigation process often used as the evidence that can be presented in the court of law for most prosecutable cases. This article briefs about one of the branches of Digital forensics which is Mobile forensics that aims to recover digital evidence or relevant data from a mobile device in a way that will preserve evidence. This article aims to provide the review of state-of-art and the brief about the forensic lifecycle, process and methodologies that are used for extracting and preserving the data from Mobile phones or smart phones and also some of the tools and software’s.
{"title":"Forensics-as-a-service: A Review of Mobile Forensics","authors":"Yogesh Kumar Sharma, Syed Shagufta Noval, Arpit Jain, B. Sabitha, T. Ramya","doi":"10.1109/IC3I56241.2022.10072726","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072726","url":null,"abstract":"Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media. It is the most intricate step of the cybercrime investigation process often used as the evidence that can be presented in the court of law for most prosecutable cases. This article briefs about one of the branches of Digital forensics which is Mobile forensics that aims to recover digital evidence or relevant data from a mobile device in a way that will preserve evidence. This article aims to provide the review of state-of-art and the brief about the forensic lifecycle, process and methodologies that are used for extracting and preserving the data from Mobile phones or smart phones and also some of the tools and software’s.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132357928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-14DOI: 10.1109/IC3I56241.2022.10073137
Amitabh Bhargava, A. Rana, D. Bhargava
Voting is the right of every citizen to make significant decisions regarding the selection of their respective government. The contemporary voting techniques such as ballot boxes, Electronic Voting Machines and digital voting systems can be susceptible to security concerns such as DDoS attacks, fraudulent votes, vote tampering and manipulation and virus assaults. The proposed method an attempt to propose a secure electoral process with the use of block chain technology. This article proposes the use of Blockchain Technology to mitigate faults in existing e-voting system and offers more safe, trustworthy, and transparent system. The proposed block chain based digital voting proposes data security and decentralization to address the challenges with the current voting method.
{"title":"Blockchain based digital voting system: A secure and decentralized electoral process","authors":"Amitabh Bhargava, A. Rana, D. Bhargava","doi":"10.1109/IC3I56241.2022.10073137","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073137","url":null,"abstract":"Voting is the right of every citizen to make significant decisions regarding the selection of their respective government. The contemporary voting techniques such as ballot boxes, Electronic Voting Machines and digital voting systems can be susceptible to security concerns such as DDoS attacks, fraudulent votes, vote tampering and manipulation and virus assaults. The proposed method an attempt to propose a secure electoral process with the use of block chain technology. This article proposes the use of Blockchain Technology to mitigate faults in existing e-voting system and offers more safe, trustworthy, and transparent system. The proposed block chain based digital voting proposes data security and decentralization to address the challenges with the current voting method.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121755045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-14DOI: 10.1109/IC3I56241.2022.10072629
R. Sikka, Sakshi Sharma
Transformers are the most expensive and strategically vital component of power systems. When the insulation between the power transformers’ laminations deteriorates, it may result in serious failures in big transformers and unintentional outages that can be expensive to fix and cost money. The effects of composite laminates insulation damage on the power transformer laminations for a range of flux intensities and set points are investigated in this research. In the study’s experimental work, inter-lamination deterioration is induced for a variety of sites and for a range of lamination numbers, including 2, 6, and 12. For successful results, flux densities of 0. 5T, 1.0T, 1.5T, 1,7T, and 1. 8T were needed. According to the study’s results, the magnetic characteristics of the cores are dramatically impacted when inter-lamination insulation fails. Temperatures and power loss grow considerably as the number of shorted laminations grows.
{"title":"Unconventional Research on the Consequences of Insulating Material Damage Problem within Distribution Transformers Laminations","authors":"R. Sikka, Sakshi Sharma","doi":"10.1109/IC3I56241.2022.10072629","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072629","url":null,"abstract":"Transformers are the most expensive and strategically vital component of power systems. When the insulation between the power transformers’ laminations deteriorates, it may result in serious failures in big transformers and unintentional outages that can be expensive to fix and cost money. The effects of composite laminates insulation damage on the power transformer laminations for a range of flux intensities and set points are investigated in this research. In the study’s experimental work, inter-lamination deterioration is induced for a variety of sites and for a range of lamination numbers, including 2, 6, and 12. For successful results, flux densities of 0. 5T, 1.0T, 1.5T, 1,7T, and 1. 8T were needed. According to the study’s results, the magnetic characteristics of the cores are dramatically impacted when inter-lamination insulation fails. Temperatures and power loss grow considerably as the number of shorted laminations grows.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121790341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-14DOI: 10.1109/IC3I56241.2022.10072499
Akash Saxena, Bhasker Pant, Joel Alanya-Beltran, S. Akram, B. Bhaskar, Rohit Bansal
The Industrial Internet of Things (IIoT) has become one of the most rapidly developing innovative technologies in recent years, with the potential to digitize and connect numerous industries for enormous commercial prospects and growth of the global GDP. Industry, logistics, shipping, petroleum and natural gas, mining and metals, power utilities, and aviation are just a few of the diverse industries that employ IIoT. Even while the IIoT offers exciting potential for the creation of many industrial applications, these applications must meet more stringent security standards and are vulnerable to cyberattacks. Since there are so many sensors There is a tone of data in the IIoT networkis produced, which has caught the attention of hackers all around the world. The intrusion detection system (IDS), which monitors network traffic and identifies network activity, is one of the main security solutions for defending IIoT applications from threats. Recent research has shown that deep learning and machine learning techniques can enhance intrusion detection effectiveness and lessen a range of security risks. In this work, we provide an overview of IIoT-focused IDS techniques based on deep learning. Providing a range of deep learning-based IDS detection techniques, datasets, and comparative studies is the major goal of this effort. Ultimately, the goal of the study is to highlight the shortcomings and difficulties of past investigations.as well as possible alternatives and potential trends.
{"title":"A Detailed Review of Implementation of Deep Learning Approaches for Industrial Internet of Things with the Different Opportunities and Challenges","authors":"Akash Saxena, Bhasker Pant, Joel Alanya-Beltran, S. Akram, B. Bhaskar, Rohit Bansal","doi":"10.1109/IC3I56241.2022.10072499","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072499","url":null,"abstract":"The Industrial Internet of Things (IIoT) has become one of the most rapidly developing innovative technologies in recent years, with the potential to digitize and connect numerous industries for enormous commercial prospects and growth of the global GDP. Industry, logistics, shipping, petroleum and natural gas, mining and metals, power utilities, and aviation are just a few of the diverse industries that employ IIoT. Even while the IIoT offers exciting potential for the creation of many industrial applications, these applications must meet more stringent security standards and are vulnerable to cyberattacks. Since there are so many sensors There is a tone of data in the IIoT networkis produced, which has caught the attention of hackers all around the world. The intrusion detection system (IDS), which monitors network traffic and identifies network activity, is one of the main security solutions for defending IIoT applications from threats. Recent research has shown that deep learning and machine learning techniques can enhance intrusion detection effectiveness and lessen a range of security risks. In this work, we provide an overview of IIoT-focused IDS techniques based on deep learning. Providing a range of deep learning-based IDS detection techniques, datasets, and comparative studies is the major goal of this effort. Ultimately, the goal of the study is to highlight the shortcomings and difficulties of past investigations.as well as possible alternatives and potential trends.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128001683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-14DOI: 10.1109/IC3I56241.2022.10072448
Geerija Lavania, V. Arya, N. Sharma, Mamoon Rashid, S. Akram
In the realm of image processing and pattern recognition, writing with gestures in the air has grown in popularity and difficulty over the past few years. It contributes significantly to the creation of automation processes and can improve human-machine communication in a range of systems. Many studies focus on cutting-edge methods and techniques that will expedite processing while preserving a high level of identification accuracy. Internally, the area of computer vision considers object tracking to be crucial. Object tracking techniques are credited to modern computers, easy access to good-looking, affordable video cameras, and automated video analytics requirements. The video analysis technique generally consists of three fundamental steps: first, recognizing the object, second, tracking its movement from frame to frame, and third, assessing the behavior of that object. Each of the four takes into account a separate issue: choosing the best item representation, choosing the tracking function, purchasing the item, and tracking the item. Numerous real-world applications, such as autonomous monitoring, video identification, and vehicle navigation, depend heavily on object-tracking algorithms. This area is utilized by the research, which focuses on it to create a prospective text-to-text converter transition. This Research occasionally works as a freelance journalist. Your fingerprint will be tracked by a computer. The created text can be copied and used for a variety of things, including emails and SMS. For the deaf, it will be a potent means to establish this connection. By removing the need for writing, an efficient communication system decreases the use of the phone and laptop.
{"title":"Real-Time Signal Processing using AI Integrated Framework for Color and Drawing in Gesture Recognition","authors":"Geerija Lavania, V. Arya, N. Sharma, Mamoon Rashid, S. Akram","doi":"10.1109/IC3I56241.2022.10072448","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072448","url":null,"abstract":"In the realm of image processing and pattern recognition, writing with gestures in the air has grown in popularity and difficulty over the past few years. It contributes significantly to the creation of automation processes and can improve human-machine communication in a range of systems. Many studies focus on cutting-edge methods and techniques that will expedite processing while preserving a high level of identification accuracy. Internally, the area of computer vision considers object tracking to be crucial. Object tracking techniques are credited to modern computers, easy access to good-looking, affordable video cameras, and automated video analytics requirements. The video analysis technique generally consists of three fundamental steps: first, recognizing the object, second, tracking its movement from frame to frame, and third, assessing the behavior of that object. Each of the four takes into account a separate issue: choosing the best item representation, choosing the tracking function, purchasing the item, and tracking the item. Numerous real-world applications, such as autonomous monitoring, video identification, and vehicle navigation, depend heavily on object-tracking algorithms. This area is utilized by the research, which focuses on it to create a prospective text-to-text converter transition. This Research occasionally works as a freelance journalist. Your fingerprint will be tracked by a computer. The created text can be copied and used for a variety of things, including emails and SMS. For the deaf, it will be a potent means to establish this connection. By removing the need for writing, an efficient communication system decreases the use of the phone and laptop.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134010978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-14DOI: 10.1109/IC3I56241.2022.10073247
Ritu Shree, Manjeet
A cryptographic tool known as the aggregate message authentication code (aggregate MAC) can condense the MAC’Stags from several messages into a single, condensed aggregate MAC’Stag. The sequentially aggregated MAC’s may additionally verify the (sequential) order of messages in addition to the correctness of multiple messages. In this study, we provide a novel sequentially aggregated MAC’s paradigm in which an aggregation kind of algorithm creates a sequential aggregating based just on any type of various sequences officially describe type of security in this paradigm, which uses separate MAC’Stags without a secret key. Additionally, without altering the MACs’ structure, we provide a general method of building consecutive aggregate MACs beginning from any MAC. By integrating the aggregation algorithm with other MAC’s methods currently present in the given type of networks, this property is helpful to increase the efficiency of the current networks. It also offer a sequential aggregate MAC’s with detecting capabilities by expanding the SAMAC’s findings (SAMD’S). It can define a message which is valid or invalid order for a particular type of message using the SAMD’S. We propose a general type of design of SAMD’S using random type of oracle model from which any MACs and non-adaptive group can be tested and their kind of protocols with formal type of security implementation proofs. We further define the type of security of SAMD’S.
{"title":"Revisiting Aggregation Sequentially with M-A-C’s and Detecting Functionality","authors":"Ritu Shree, Manjeet","doi":"10.1109/IC3I56241.2022.10073247","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073247","url":null,"abstract":"A cryptographic tool known as the aggregate message authentication code (aggregate MAC) can condense the MAC’Stags from several messages into a single, condensed aggregate MAC’Stag. The sequentially aggregated MAC’s may additionally verify the (sequential) order of messages in addition to the correctness of multiple messages. In this study, we provide a novel sequentially aggregated MAC’s paradigm in which an aggregation kind of algorithm creates a sequential aggregating based just on any type of various sequences officially describe type of security in this paradigm, which uses separate MAC’Stags without a secret key. Additionally, without altering the MACs’ structure, we provide a general method of building consecutive aggregate MACs beginning from any MAC. By integrating the aggregation algorithm with other MAC’s methods currently present in the given type of networks, this property is helpful to increase the efficiency of the current networks. It also offer a sequential aggregate MAC’s with detecting capabilities by expanding the SAMAC’s findings (SAMD’S). It can define a message which is valid or invalid order for a particular type of message using the SAMD’S. We propose a general type of design of SAMD’S using random type of oracle model from which any MACs and non-adaptive group can be tested and their kind of protocols with formal type of security implementation proofs. We further define the type of security of SAMD’S.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-14DOI: 10.1109/IC3I56241.2022.10073285
Swarupa Pelleti, Sahil Bains, A. Bansal, I. Muda, Harish Chowdhary, Yashodhan Mahajan
Personalized suggestions, such as those based on a user’s search history, purchase history, or other online activity, are a common use of artificial intelligence. AI is used a lot in commerce to do things like optimize products, plan inventory, handle logistics, and more. In order to deal with the problems caused by cloud computing, big data, and AI, developers of modern information systems are adding AI to the platform for managing information. Natural language, intelligent processing, and established procedures are all components of artificial intelligence, a subfield of computer science. Since the inception of AI, there has been continuous development in both the underlying technology and the range of potential uses. The purpose of this essay is twofold: first, to investigate how AI may be useful in the management information system of the container transport industry, and second, to offer suggestions for how that system might be enhanced. K-means clustering is an approach that is proposed in this work. The efforts made in building the terminal management system have substantially benefited the fields of automation, intelligent planning, and integrated management. A lot of work has gone into improving the terminal management system, and it has paid off in the form of significant advances in areas like automation, intelligent planning, and integrated management. Mulesoft Anypoint, which relies heavily on the Navic information platform and GPS for its Internet connectivity, is also being implemented at the same time. Therefore, the CCR approach is employed to operate the multimodal transport virtual container while analyzing its performance under coproduction’s management. When sent in containers, as much as 98.5 % of goods arrive in one piece.
{"title":"Management Information System based on Artificial Intelligence Technology","authors":"Swarupa Pelleti, Sahil Bains, A. Bansal, I. Muda, Harish Chowdhary, Yashodhan Mahajan","doi":"10.1109/IC3I56241.2022.10073285","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073285","url":null,"abstract":"Personalized suggestions, such as those based on a user’s search history, purchase history, or other online activity, are a common use of artificial intelligence. AI is used a lot in commerce to do things like optimize products, plan inventory, handle logistics, and more. In order to deal with the problems caused by cloud computing, big data, and AI, developers of modern information systems are adding AI to the platform for managing information. Natural language, intelligent processing, and established procedures are all components of artificial intelligence, a subfield of computer science. Since the inception of AI, there has been continuous development in both the underlying technology and the range of potential uses. The purpose of this essay is twofold: first, to investigate how AI may be useful in the management information system of the container transport industry, and second, to offer suggestions for how that system might be enhanced. K-means clustering is an approach that is proposed in this work. The efforts made in building the terminal management system have substantially benefited the fields of automation, intelligent planning, and integrated management. A lot of work has gone into improving the terminal management system, and it has paid off in the form of significant advances in areas like automation, intelligent planning, and integrated management. Mulesoft Anypoint, which relies heavily on the Navic information platform and GPS for its Internet connectivity, is also being implemented at the same time. Therefore, the CCR approach is employed to operate the multimodal transport virtual container while analyzing its performance under coproduction’s management. When sent in containers, as much as 98.5 % of goods arrive in one piece.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133073080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-14DOI: 10.1109/IC3I56241.2022.10072572
T. Mahesh, Devi Kanniga
The Finding usable data in huge, abundant archives is connected to data gathering. The objective is to develop tools that help individuals find key trends in massive volumes of data. Electricity mined is such a crucial technological advancement. Similar data extends mine for things, which are frequently found via the trust and backing of other items with in data set. Through the use of a common miner concept, several scholars too have created a unique idea for the liquidity mine on items. In this study, we aim to identify eligible pieces & item set based on a criterion called weighted transactions utility. In addition, we provide a fresh ultimately greater data mining technique. The novel approach outperforms earlier computation techniques.
{"title":"A Powerful Data Mining Method for Locating Sets of High Electricity Items","authors":"T. Mahesh, Devi Kanniga","doi":"10.1109/IC3I56241.2022.10072572","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072572","url":null,"abstract":"The Finding usable data in huge, abundant archives is connected to data gathering. The objective is to develop tools that help individuals find key trends in massive volumes of data. Electricity mined is such a crucial technological advancement. Similar data extends mine for things, which are frequently found via the trust and backing of other items with in data set. Through the use of a common miner concept, several scholars too have created a unique idea for the liquidity mine on items. In this study, we aim to identify eligible pieces & item set based on a criterion called weighted transactions utility. In addition, we provide a fresh ultimately greater data mining technique. The novel approach outperforms earlier computation techniques.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133811359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-14DOI: 10.1109/IC3I56241.2022.10072735
Ganesh Korwar, S. Jabade, N. Satpute, Swapnil Arawade
In this paper the numerical simulation of the MERVH is presented. The simulation is mainly intended to investigate the effectiveness of MERVH for human activities such as slow walking, fast walking, jumping, jogging, and running. The MATLAB-Simulink is used to numerically analyze the theoretical model. The results revealed that the MERVH provides average power output varying from 0.04 W to 0.19 W and peak power of 4.41 W. The maximum power was obtained in case of running motion. The MERVH is found to be useful in powering wearable devices and operating the medical sensors.
{"title":"Numerical Simulation of MERVH (Motion and Energy Regulating Vibration Harvester) for different human activities","authors":"Ganesh Korwar, S. Jabade, N. Satpute, Swapnil Arawade","doi":"10.1109/IC3I56241.2022.10072735","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072735","url":null,"abstract":"In this paper the numerical simulation of the MERVH is presented. The simulation is mainly intended to investigate the effectiveness of MERVH for human activities such as slow walking, fast walking, jumping, jogging, and running. The MATLAB-Simulink is used to numerically analyze the theoretical model. The results revealed that the MERVH provides average power output varying from 0.04 W to 0.19 W and peak power of 4.41 W. The maximum power was obtained in case of running motion. The MERVH is found to be useful in powering wearable devices and operating the medical sensors.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114152156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}