ICMACC-22: INTERNATIONAL CONFERENCE ON RECENT TRENDS IN MICROELECTRONICS, AUTOMATION, COMPUTING AND COMMUNICATIONS SYSTEMS (ICMACC-22))
PROGRAM FOR FRIDAY, DECEMBER 30TH
Days:
previous day
all days

View: session overviewtalk overview

10:15-11:00 Session 12: Keynote Address

Keynote Address - VII

10:15
Engineering Development Paradigm Shifts Due to Machine Learning on Edge Devices

ABSTRACT. Machine learning and artificial intelligence will become defacto in many systems ranging from small microcontroller based devices to large complex server based systems released over the next few years. With these new trends, it is important to embrace the change needed from an engineering development perspective because developers need to consider adding machine learning components into the development flow. Similar to the need for DevOps for scale, engineers now need to consider MLOps into their development flow. On top of machine learning, connectivity to cloud services is becoming the norm of many edge devices to take advantage of many available cloud services. Engineers need to consider the different services offered by cloud service providers to make the concept of cloud to edge as seamless as possible and achieve scale. This keynote will provide an overview of the key development methodologies that different companies need to consider when building devices with machine learning capabilities and cloud service providers.

11:00-11:45 Session 13: Keynote Address

Keynote Address - VIII

11:00
Machine Learning in Ads

ABSTRACT. We will present an overview of the Ads systems in social media companies. We will address some of the challenges that arise due to petabyte scale data and how machine learning is used to tackle these challenges.

11:45-13:15 Session 14A: Technical Session A IV
11:45
Hysteresis Current Control PFC in Switched Mode AC-DC Con verter with POESL Luo Converter for DC Machines used for Water Pumping Applications Operating on Universal Input Supply

ABSTRACT. One of the most important requirements to be consider when designing a converter to convert the supply from an Alternating Current to Direct Current for DC loads to improve the power quality enhancement at the input side. In this paper, input side, the applied voltage is boosted from 230rms volts value is given to obtain the desired output value as 400v with the help of a Boost Converter. Since it effectively overcomes the effects of parasitic elements and significantly increases the output voltage. To achieve this, the voltage-lift technique is a common method that is commonly used in electronic circuit designs. As a result, dc/dc converters can convert a lower input voltage to a higher output voltage while maintaining high power efficiency and density. However, maintaining power factor at input side closer to unity is a big problem. Owing to these, power quality is improved by improving the power factor with hysteresis current control strategy and also, incorporating outer voltage control technique. As this model is operating on universal supply is converted into dc voltage with DBR (Diode Bridge Rectifier) conversion is up lifted to the desired voltage of a three – phase dc motor value used for industrial applications such as hydraulic pump operations to pump the water at constant speed drive and chemical injection pump applications.

12:00
Implementation of Nearest Vector Control and Nearest Level Control for Three Phase, Five Level CHB MLI with WAVECT Controller

ABSTRACT. Today, multilevel converters are considered the most advanced power conversion devices for high-quality applications. Because of the redundancy and modular structure, cascaded h-bridge multilevel inverters have been used in various industrial applications. Depending on the application and the multilevel inverter, many different modulation algorithms have been created or changed. Each one has its own pros and cons. In this paper, the modulation techniques Nearest Vector Control (NVC) and Nearest Level Control (NLC) have been implemented for three phase five level cascade h-bridge multilevel inverter in simulation with the help of MATLAB/Simulink. The NVC and NLC are compared with their total harmonic distortion factor in the output voltage. Using the WAVECT controller in an experimental setup, the results of the simulations are tested. NLC provides a better total harmonic distortion factor as compared with NVC.

12:15
A Review on Power line communication and its applicability to Cable fault monitoring

ABSTRACT. Communication over power lines do not need any additional infrastructure. However, this technology is still in its naïve stage despite inventing it a century ago. In this paper, an attempt is made to understand the prospects of PLC and the role it can play in conjunction with future technologies. For this, it is important to understand the merits, limitations and applications of PLC. The penetration of PLC is better than wireless communication in rural areas and concrete structures. In this paper, the applicability of PLC in identifying the cable faults is studied. The cable faults are monitored using channel modelling technique and experimental analysis

12:30
A Novel Low Loss, Medium Gain CI based DC-DC Boost Converter

ABSTRACT. An expeditious growth in population, urbanization and industrialization demands for non-polluted air for better life standards in smart cities, metro cities and urban areas. A move towards better life standards is to encourage green transportation for the needs of future generations. One such solution is to use electric vehicles (EVs), but still 3/4th of today’s transportation had relying on petrol and their by-products-based engines due to lack of awareness, fire accidents, storage limitation, charging times and lack of charging infrastructure. So, to address one of the said limitations proposed a compact, efficient, and simple novel DC-DC boost converter for medium gain applications. It is first of its kind uses one controlled switch and two uncontrolled switches along with coupled inductor which also made the proposed converter to be the potential converter stage in the onboard charger, electrical drive system and fast charging infrastructure. A mathematical analysis carried out to find values inductance, capacitance, and duty cycle to get the required gain. The CI based converter is simulated in MATLAB Simulink environment under open loop and closed loop.

12:45
Fault Detection and Classification in Micro Grid Using AI Technique

ABSTRACT. This project presents a method for detecting faults in a micro grid using Artificial intelligence (AI). A wind generator, a solar photovoltaic system, and a diesel generator are all part of the micro grid model under consideration. Simulink is used to simulate normal and fault conditions for the micro grid. The fault conditions simulated represent faults encountered by a distribution line. The AI is trained using the fault voltages and currents in MATLAB. The trained AI is then tested to detect various faults using simulated data. The AI successfully identifies faults in the micro grid

13:00
MICRO-GENERATOR BASED POWER HARVESTING TILES

ABSTRACT. This article aims to obtain energy through human footstep. It is about a method of generating electricity by applying human waste energy. As people move to a particular area, more energy is generated and this energy can be used to generate electricity. Converting gravitational compression into electricity is possible with the help of a micro-generator. Using micro generators as power converters, generators can be a great application. Today's power and energy are among the necessities of today's world. As energy demand increases day by day, the ultimate solution to these problems is the simple use of renewable energy sources. The purpose of this article is to generate electricity in phases as a renewable energy source that can be continued for certain projects such as roads, stairs, and apartments. These systems can be relocated, especially in densely populated areas.

11:45-13:15 Session 14B: Technical Session B I
11:45
ACADEMIC PROJECTS ON CERTIFICATION MANAGEMENT USING BLOCKCHAIN -A REVIEW

ABSTRACT. Blockchain as an emerging technology was profoundly known to the world because of its inherited features such as immutability, enhanced security, transparency, and moreover, faster settlement. This emerging technology is reasonably practical and offers great potential to impact a wide range of data-driven areas, including the education sector. We focused on exploring open-source, blockchain-based educational projects and applications related to higher education and resolving the difficulties that learner face today. This paper seeks to demonstrate the objectives, opportunities, and possible impacts associated with this revolutionary technology.

12:00
A class topper optimization-based approach to solve environment constrained economic dispatch problem for a microgrid system

ABSTRACT. A microgrid is an independent energy system comprising loads, distribution generators, and renewable sources of energy like a solar cell or wind turbine. Power generation becomes a tedious task due to the dynamic nature of the load as optimal scheduling is required to keep the generators within operational limits. Further, cost minimization is the primary objective in power generation that adds the value of optimal scheduling. Due to the recent upsurge in industries and advancement in transportation, environmental emission has increased in a drastic way. Therefore, a compromised solution is required. This paper uses a Class Topper Optimization (CTO) algorithm to solve the economic load dispatch (ELD), economic emission dispatch (ECD), and price penalty factor (PPF) based on the combined economic and emission dispatch (CEED) problem for microgrid system.

12:15
Impact of Organizational Commitment Components on the Teachers of Higher Education in Uttarakhand: An Emperical Analysis

ABSTRACT. Twenty first century is characterized by the expansion of wisdom and knowledge. The Responsibility of growth and success of any educational institutes lies on the shoulders of the committed, proficient and enthusiastic faculty working in the education institutes. Organizational commitment involves the loyalty of the individuals toward their organization, employee’s inclination to make an attempt on behalf of the organization. The purpose of the study is to understand the impact of O.C. components on the teachers of higher education. To analyze the impact of demographic factors on three components of O.C. on teachers of higher education, secondary data was referred from high index (SCOPUS, W.O.S. etc.) journals. Primary data was collected using goggle form. A modified structured questionnaire was used (Bateman, Organ 1983). Three components viz. Affective, Continuance and Normative were considered. Convenience sampling was used. Cronbach alpha= 0.619 was used to check the reliability of the scales. The study indicates that there was no significant difference between the genders and OC. Affective component is negatively correlated with other two factors whereas Normative and continuance is positively correlated with each other.

12:30
Organizational Commitment and the Academic Staff in HEI’s in North West India

ABSTRACT. Organizational Commitment of the employees is regarded as the most critical matter in the higher educational institutes for accomplishing the purpose and objectives. It helps in ascertaining the vision of the organization. The subject-matter is considered to unsheathe the efficiency and effectiveness of the higher educational institutes of Uttarakhand. The main objective of the study is to assess the level of organizational commitment amongst the faculty. Organizational commitment was measured on a scale developed by Meyer and Allen. The sample size was 333 faculty members from different higher educational institutes of Uttrakhand. The data was analyzed using Excel and SPSS. Simple random sampling was done to collect the primary data. The study indicates that faculty has considerable continuance commitment as compared to the other dimensions of organizational commitment. Also there is significant difference between the Genders of the HEI’s employees and their three commitment levels. It is applicable in organizations

12:45
Measuring Course Attainment through Competencies and Performance Indicators : A case of Computer Lab Based Course

ABSTRACT. William Spady proposed Outcome Based Education (OBE) during 90's to bring more focus in the formal education. Moving from teacher centric approach to learner centric approach, aligning curriculum, teaching learning activities, outcome-based assessment methods, aiding the learner to exhibit higher order thinking skills are the list of few best practices implemented through OBE. OBE in helps learners to understand Knowledge, skills and behavioral attributes that they can demonstrate at the end of the programs and provide over all guidelines to the teachers on the list of courses, concepts, teaching pedagogy and assessment methods to follow to achieve the desired outcomes. Measuring the success of Implementing outcome-based education helps to improve the overall quality of teaching learning process. OBE is measured by measuring program education objectives, program outcomes and course outcomes which can be quantified through assessment methods. Mapping the course outcomes with program outcomes and program educational objectives is one of the major steps in measuring the OBE. As the program outcomes statements are written at very generic level, in general it would be difficulty to map the course outcomes with the program outcomes. To simplify this process and as recommended by AICTE Exam reform policy, the researchers in this article has introduced the concept of competency and attempted to link the course outcomes with the program outcome through competency and performance indicators. A frame work and guideline to measure the attainment of course outcome through competency and performance indicators is discussed by illustrating a Practical-based course.

11:45-13:15 Session 14C: Technical Session D III
11:45
Implementation and analysis of Web application security measures using OWASP Guidelines

ABSTRACT. Web application security is the most important area when it comes to developing a web application. Many web applications having vulnerabilities due to poor implementation of security measures. These web applications will be deployed without fixing the vulnerabilities thus becomes vulnerable to many cyber-attacks. Simple attacks like brute-force and NoSQL injection could give unauthorized access to the user accounts. This leads to user privacy issues which could create huge loss to the organizations. These vulnerabilities can be fixed by implementing the necessary security measures while developing the web application. OWASP (Open Web Application Security Project) is a non-profit organization which gives the severity, impact and prevention methods about Top 10 vulnerabilities in web applications. This research deals with the implementation of best security practices for Node.js web applications in detail. This research paper proposes the security mechanisms for attacks related to front-end, middleware and backend web development using OWASP suggestions. The main focus of this research paper is on prevention of Denial-of-service attack, Brute force attack, NoSQL injection attack and Unrestricted file upload vulnerability. The proposed prevention methods are implemented in a web application to test the defensive mechanisms against the mentioned vulnerabilities.

12:00
Detection of Malware in the Network Using Machine Learning Techniques

ABSTRACT. The increased use of the internet has presented the most significant challenge to the digital world's security. Malicious URLs are the most common way for people to engage in phishing schemes and spread viruses like trojans and worms. Various dangerous URLs attempt to obtain user information by distributing different harmful malware. End-users can be susceptible if a genuine user is unable to recognize and remove fraudulent URLs. Attackers can potentially acquire unauthorized access to user data by using malicious URLs. As a result, identifying countermeasures to halt such operations using new and advanced technology is a critical step One of its most effective methods has been thought to be based on ML approaches for correctly identifying a URL as malicious or benign. The project's main goal is to deploy the system in a way that is both efficient and accuracy.

12:15
Sentiment analysis on E-commerce reviews and rating using ML & NLP models to understand consumer behavior.

ABSTRACT. This research paper covers the sentiment analysis of fashion e-commerce products by comparing their reviews (electronic word-of-mouth), and ratings using ML model and NLP concepts. The scope of the paper dives into the aspect of understanding consumer behavior in a virtual environment. It explores the impact of eWOM and ratings of a product, on customer attitude, and the likelihood of that product being purchased. We have further established a relationship between ratings, reviews and product recommendations. The paper contains exploratory analysis backed with proper reasoning. We have made use of ML classification models like logistic regression, ADA boost, SVM, naïve Bayes, and random forest on customer reviews. We have further used Vader and textblob technologies to perform sentiment analysis.

12:30
Optimal Parameter Design of Plate-fin Heat Exchangers using Kho-Kho Optimization Algorithm

ABSTRACT. To manufacture a precise mechanical device, design plays a crucial part with the materials employed. Because any mechanical system's output is determined by how well its mechanical components are built or designed for large-scale production. In this paper, a mechanical model is carried out for optimal designing of the Plate-fin heat exchangers (PFHE) to minimise three objective functions i.e. total area of heat transferred, total pressure loss or drop, and total annual cost, in order to solve design challenges in mechanical devices and improve production. In this case, the heat exchanger pressure loss, annual cost, and efficacy are estimated using the $\varepsilon$ -NTU approach. Seven design variables are considered as decision variables: flow length of both cold and hot stream, height of fin, no-flow length, fin-pitch, and offset length of fin. This paper offers the Kho-Kho Optimizer(KKO), a meta-heuristic, inspired by Khoko's game strategy to resolve the issues for better performance. The findings obtained utilising the KKO approach are compared to those obtained using other optimization procedures with original preliminary design variables in this study. Finally, when it comes to addressing a mechanical problem, the KKO algorithm surpasses several existing meta-heuristic optimization algorithms.

12:45
3D printing Integration with Topology optimization for Innovative design and fabrication of Light Weight Aerospace Structures

ABSTRACT. Topology optimization (TO) and 3D printing are the precocious methodologies which are integrated to produce light-weight structures with supercilious performance within design constraints of the structures. This research article discusses, the TO approach is used to determine the aircraft landing door bracket's optimum shape & size under various loads. The complicated optimised shape, which is challenging to build through convectional manufacturing process, is then created using 3D printing technique. Since from many years TO & 3D printing have been performed separately, hence integrating these two techniques brings symbiosis results of obtaining light weight and complex geometric components. This article focuses on topology optimized approach by considering overhang constraint to fabricate a light weight aircraft landing door bracket through metal 3D printing technique using Selective laser melting (SLM )process. Altair solid-thinking inspire and optisturct solver are used for this work. This article mainly focuses on shape optimization, mass reduction and to produce light weight bracket by 3D printing where the mass is reduced by about 52.27% without compromising structural and functional performance of the bracket. The obtained results indicate that, when 3D printing is taken into account, topology optimization is a viable way of minimizing product weight while retaining design standards.

13:00
The Taxonomy of Security issues and Countermeasures in the Metaverse World

ABSTRACT. The boundaries between the real world and the virtual world are going to be blurred by Metaverse. It is transforming every aspect of humans to seamlessly transition from one virtual world to another. It is connecting the real world with the digital world by integrating emerging tech like 5G, 3d reconstruction, IoT, Artificial intelligence, digital twin, augmented reality (AR), and virtual reality (VR). Metaverse platforms inherit many security & privacy issues from underlying technologies, and this might impede their wider adoption. Emerging tech is easy to target for cybercriminals as security posture is in its infancy. This work elaborates on current and potential security, and privacy risks in the metaverse and put forth proposals and recommendations to build a trusted ecosystem in a holistic manner.

14:15-16:00 Session 15: Valedictory

Valedictory Keynote Address

14:15
Smart Grid, Micro Grid, and Smart Meters: Technological Challenges & Opportunities

ABSTRACT. Automation, computing, communication, instrumentation, and sensor technologies have been widely used in industries, globally. The invasion of smart devices is rapidly transforming the various sectors of economy. The combination of smart devices, communication, analytics, artificial intelligence, and agile software has given rise to innovations such as Smart Grid, Micro Grid, and Smart meters for improving efficiency and availability of electricity in developed as well as developing countries. This is further complemented and supplemented by dynamics of new and renewable energy resources for grid-connected and a standalone system. Therefore, innovations in automation, computing, and communication have to be accelerated for incorporating in Smart Grid, Micro Grid, and Smart Metering technologies in the global arena