Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688272
Jai Mangal, Ajay Kumar
This paper contemplates the designing of a compact two-port MIMO antenna for ultra-wideband frequency range applications. This paper introduces the concept of partial ground which eventually helps in achieving wider frequency bandwidth. The proposed MIMO antenna is designed over a substrate called FR4 epoxy. The patch located in the ground plane was fabricated using copper. The proposed MIMO antenna dimensions are 24mm×24mm×1.6mm. Patch placed at the top of the antenna is created by placing circular slots which eventually lead to steady current and higher reflection coefficient. The antenna achieves a reflection coefficient of −42.62 dB at the resonating frequency of 8.6 GHz. The antenna achieves the −10dB bandwidth ranging from 3 GHz to 12 GHz which covers the whole unlicensed ultra-wideband frequency range. The antenna achieves a maximum gain of 2.6 dBi at 10.6 GHz. Radiation efficiency of the antenna is 95.21%. This work concludes the designing of a two-port antenna that can attain a higher reflection coefficient with a wider bandwidth. The antenna can achieve these purposes with the help of annular patches and partial ground.
{"title":"An Annular Shaped Two-Port MIMO Antenna For Ultra Wide Band Frequency Range Applications","authors":"Jai Mangal, Ajay Kumar","doi":"10.1109/CENTCON52345.2021.9688272","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688272","url":null,"abstract":"This paper contemplates the designing of a compact two-port MIMO antenna for ultra-wideband frequency range applications. This paper introduces the concept of partial ground which eventually helps in achieving wider frequency bandwidth. The proposed MIMO antenna is designed over a substrate called FR4 epoxy. The patch located in the ground plane was fabricated using copper. The proposed MIMO antenna dimensions are 24mm×24mm×1.6mm. Patch placed at the top of the antenna is created by placing circular slots which eventually lead to steady current and higher reflection coefficient. The antenna achieves a reflection coefficient of −42.62 dB at the resonating frequency of 8.6 GHz. The antenna achieves the −10dB bandwidth ranging from 3 GHz to 12 GHz which covers the whole unlicensed ultra-wideband frequency range. The antenna achieves a maximum gain of 2.6 dBi at 10.6 GHz. Radiation efficiency of the antenna is 95.21%. This work concludes the designing of a two-port antenna that can attain a higher reflection coefficient with a wider bandwidth. The antenna can achieve these purposes with the help of annular patches and partial ground.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127525207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688177
Sridhar S K, Amutharaj J
This paper validates the effectiveness of decision tree classification models by performing the data analysis of the large data set collected in the real time implementation of an intelligent composite offload decision (ICODA) framework with on-premise mobile device cloud. We have collected around 40000 data records of real time device resource status information with 7 inputs and 1 output attribute each at different time conditions. These 40000 data records are then cleaned and normalized to scale down in practical range to about 4608 training samples. The machine learning classification technique is applied on different train-test-split ratio using ID3, CART and random forest classifiers (RFC) with proper randomized and grid search cross validations. The resulting mean accuracy percentage is observed at 92.91 with ID3, 99.22 with CART and 99.44 with RFC evaluating all the possible combinations in the data set. The experimental results show that the random forest classifier outperforms the other methods in data offload framework.
{"title":"Decision Tree based Classification of Profiled Mobile Device Resource Status Information for Data Offloading in Private Network","authors":"Sridhar S K, Amutharaj J","doi":"10.1109/CENTCON52345.2021.9688177","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688177","url":null,"abstract":"This paper validates the effectiveness of decision tree classification models by performing the data analysis of the large data set collected in the real time implementation of an intelligent composite offload decision (ICODA) framework with on-premise mobile device cloud. We have collected around 40000 data records of real time device resource status information with 7 inputs and 1 output attribute each at different time conditions. These 40000 data records are then cleaned and normalized to scale down in practical range to about 4608 training samples. The machine learning classification technique is applied on different train-test-split ratio using ID3, CART and random forest classifiers (RFC) with proper randomized and grid search cross validations. The resulting mean accuracy percentage is observed at 92.91 with ID3, 99.22 with CART and 99.44 with RFC evaluating all the possible combinations in the data set. The experimental results show that the random forest classifier outperforms the other methods in data offload framework.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"182 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124582276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688261
Arpita Sarkar, Ranjitha Govindaraj, Jyotsna Rao J, Uttam Pal
Toilet cleaners are common in urban households. The market is flooded with toilet cleaners. Composed of strong chemicals, they are known to release harmful pollutants into the air and water. This study aims to investigate the indoor pollutant concentrations in a toilet after using toilet cleaners and understand their determinant on the air quality. The experiment was conducted in a toilet of a residence using Harpic Power plus, Domex Active Green Formula, and Mr. Muscle Visible Power, the three of the leading brands of toilet cleaners in the market. Measurement sampling was performed for CO2, PM2.5, PM10, Temperature, Humidity, and AQI using IQAir, Visual Air Quality Monitor. The results showed an increase in the Air Quality Index to Hazardous levels for all the three products for 2 hrs after application and rinse. High concentration values of PM2.5, PM10, and CO2 were also noted during this period, rendering the space unsafe for occupancy. The paper concludes that the leading brands of toilet cleaners pose a major health risk to the occupants in the experiment.
厕所清洁工在城市家庭中很常见。市场上到处都是厕所清洁剂。它们由强化学物质组成,已知会向空气和水中释放有害污染物。本研究旨在调查使用厕所清洁剂后厕所室内污染物浓度,了解其对空气质量的决定因素。实验是在住宅卫生间内进行的,使用了目前市场上代表性的3个卫生间清洁剂品牌Harpic Power plus、Domex Active Green Formula、Mr. Muscle Visible Power。采用IQAir (Visual Air Quality Monitor)对CO2、PM2.5、PM10、温度、湿度和AQI进行测量采样。结果显示,在使用和冲洗后的2小时内,三种产品的空气质量指数均上升至危险水平。在此期间,PM2.5、PM10和CO2的浓度也很高,使得空间不适合居住。该论文的结论是,在实验中,主要品牌的厕所清洁剂对居住者构成了重大的健康风险。
{"title":"Determinant Effects of using Toilet Cleaners on Indoor Air Quality","authors":"Arpita Sarkar, Ranjitha Govindaraj, Jyotsna Rao J, Uttam Pal","doi":"10.1109/CENTCON52345.2021.9688261","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688261","url":null,"abstract":"Toilet cleaners are common in urban households. The market is flooded with toilet cleaners. Composed of strong chemicals, they are known to release harmful pollutants into the air and water. This study aims to investigate the indoor pollutant concentrations in a toilet after using toilet cleaners and understand their determinant on the air quality. The experiment was conducted in a toilet of a residence using Harpic Power plus, Domex Active Green Formula, and Mr. Muscle Visible Power, the three of the leading brands of toilet cleaners in the market. Measurement sampling was performed for CO2, PM2.5, PM10, Temperature, Humidity, and AQI using IQAir, Visual Air Quality Monitor. The results showed an increase in the Air Quality Index to Hazardous levels for all the three products for 2 hrs after application and rinse. High concentration values of PM2.5, PM10, and CO2 were also noted during this period, rendering the space unsafe for occupancy. The paper concludes that the leading brands of toilet cleaners pose a major health risk to the occupants in the experiment.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114821317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9687973
V. Singh, Amarjeet Singh, A. Aggarwal, S. Aggarwal
Information Technology companies have witnessed a growing recognition of emerging new architectural styles, such as Micro-services, for building event-oriented software systems. Usually, these applications are based on the concept of a database for each service, in which each database belongs to a completely single service. These services are built as separate business functions and are implemented using various technologies. Modern features, such as automatic deployment, are often integrated and implemented in the cloud according to proven DevOps methods. The amount of data generated every day - by sensors, website usage, events recorded by the system, etc. - is huge, as well as from various sources. Modern applications have to deal with this new flow of events. Event Micro-services allow us to obtain valuable information from these events and help users to make important business decisions. In this work event architecture concepts are investigated and it is explored that how this architectural model places events at the center of the system. Some of the main advantages of applying this architectural pattern are explored. Design choices for an event driven Micro-services along with resiliency in the event based systems are discussed.
{"title":"A digital Transformation Approach for Event Driven Micro-services Architecture residing within Advanced vcs","authors":"V. Singh, Amarjeet Singh, A. Aggarwal, S. Aggarwal","doi":"10.1109/CENTCON52345.2021.9687973","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687973","url":null,"abstract":"Information Technology companies have witnessed a growing recognition of emerging new architectural styles, such as Micro-services, for building event-oriented software systems. Usually, these applications are based on the concept of a database for each service, in which each database belongs to a completely single service. These services are built as separate business functions and are implemented using various technologies. Modern features, such as automatic deployment, are often integrated and implemented in the cloud according to proven DevOps methods. The amount of data generated every day - by sensors, website usage, events recorded by the system, etc. - is huge, as well as from various sources. Modern applications have to deal with this new flow of events. Event Micro-services allow us to obtain valuable information from these events and help users to make important business decisions. In this work event architecture concepts are investigated and it is explored that how this architectural model places events at the center of the system. Some of the main advantages of applying this architectural pattern are explored. Design choices for an event driven Micro-services along with resiliency in the event based systems are discussed.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688060
Rohitha Pasumarty, R. K N
This paper, in all its essence, is a group chat Application, between a variable number of users, who are connected to each other, by virtue of being a member of the same network. A central server acts as a service to accept messages from a user and forward it to all other users, who are participating in the group chat by being connected to the server at that point of time. Given that the server is up and running, new users can join the group chat server at any given time by providing the current local IP address and the port on which the server is running, although, this can only be done if the active members in a group chat does not exceed the specified and declared capacity of the server. If a large number of users is expected, the server can be configured to listen for a higher number of incoming connection requests, which should be carefully determined, since, performing an alteration in the capacity of the server requires the server to be restarted for the new capacity to come into effect. The main aim of this group chat server is that it is a secure group chat server which uses cryptographic algorithms Advances Encryption Standard for encrypting message. When the server is started, a random cipher key is generated for encryption and decryption of messages. This cipher key is the secret key that is confidential within the boundaries of the system. When a message originates from a user, it is encrypted before being sent to the server. The server receives this encrypted message and forwards it to the other users that are currently connected to the group chat server.
{"title":"Secure Chatroom Application using Advanced Encryption Standard Algorithm","authors":"Rohitha Pasumarty, R. K N","doi":"10.1109/CENTCON52345.2021.9688060","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688060","url":null,"abstract":"This paper, in all its essence, is a group chat Application, between a variable number of users, who are connected to each other, by virtue of being a member of the same network. A central server acts as a service to accept messages from a user and forward it to all other users, who are participating in the group chat by being connected to the server at that point of time. Given that the server is up and running, new users can join the group chat server at any given time by providing the current local IP address and the port on which the server is running, although, this can only be done if the active members in a group chat does not exceed the specified and declared capacity of the server. If a large number of users is expected, the server can be configured to listen for a higher number of incoming connection requests, which should be carefully determined, since, performing an alteration in the capacity of the server requires the server to be restarted for the new capacity to come into effect. The main aim of this group chat server is that it is a secure group chat server which uses cryptographic algorithms Advances Encryption Standard for encrypting message. When the server is started, a random cipher key is generated for encryption and decryption of messages. This cipher key is the secret key that is confidential within the boundaries of the system. When a message originates from a user, it is encrypted before being sent to the server. The server receives this encrypted message and forwards it to the other users that are currently connected to the group chat server.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123266139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688037
Dhanishtha Patil, Shubham Gaud
E-Commerce is one of the world's most fast-paced industries where the significant aspect of these industries is that they are lacking Customer-Retailer Interaction. Due to the conventional human psychology of bargaining, a product with a lower price is still popular, and some of the products in this sector lack this kind of bargaining, which would be a cause for some of the products. With the advancement of machine learning, automated and Intelligent Agent negotiating system has become a prominent tool in E-Commerce. This paper presents a negotiation technique for establishing a mutually acceptable agreement between the negotiation system which represents supplier and customers, built using Minimum Profit Algorithm designed as per seller requirements and trained on UCI machine learning repository's online retailer dataset using XG Boost regressor for intelligence. This system outperforms the traditional way of negotiation and the model was able to achieve an accuracy of 91.53 percent.
{"title":"Intelligent Automated Negotiation System in Business to Consumer E-Commerce","authors":"Dhanishtha Patil, Shubham Gaud","doi":"10.1109/CENTCON52345.2021.9688037","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688037","url":null,"abstract":"E-Commerce is one of the world's most fast-paced industries where the significant aspect of these industries is that they are lacking Customer-Retailer Interaction. Due to the conventional human psychology of bargaining, a product with a lower price is still popular, and some of the products in this sector lack this kind of bargaining, which would be a cause for some of the products. With the advancement of machine learning, automated and Intelligent Agent negotiating system has become a prominent tool in E-Commerce. This paper presents a negotiation technique for establishing a mutually acceptable agreement between the negotiation system which represents supplier and customers, built using Minimum Profit Algorithm designed as per seller requirements and trained on UCI machine learning repository's online retailer dataset using XG Boost regressor for intelligence. This system outperforms the traditional way of negotiation and the model was able to achieve an accuracy of 91.53 percent.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129420239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688089
M. Mounisha, Chirunomula Sai Kowshik, M. Reethika, A. Dhanush
Traditionally cognitive radio can be accessed by secondary user only when foremost user is absent, but the subordinate client needs to evacuate the idle spectrum when existence of foremost user is detected. Hence, the bandwidth is reduced in traditional scheme. To overcome the problem, non-orthogonal multiple access is used to increase the efficiency of spectrum in 5G communications. Non-orthogonal multiple access is used in this method to allow the subordinate user to enter into the gamut even when forecast client is attending or not attending the conduit. Foremost client decryption technique and subordinate client decryption technique are introduced to decrypt the non-orthogonal signs. Hence, through the decoding techniques secondary user throughput can be achieved, to increase the primary user throughput duct channel energy must be in a limit. However due to the disturbance caused by the foremost client the subordinate efficiency may be decreased. Orienting towards Foremost user first deciphering and subordinate user first decoding, Here, we come up with two enhancement problems to enhance the efficiency of both primary client and secondary client. This is done using jointly optimizing spectrum resource. This citation embracing how much amount of sub channel transmission power is used and also, it enhances the number of sub channels present in it. This type of citation is to enhance optimization problems. Jointly optimization algorithm is introduced to eliminate the existing problem. This is achieved by accepting the signs and calculating the time needed to sense gamut and the forecast client attending or not attending the conduit to decrypt the data sent while forecast client is absent. The miniature outcomes will be shown the non-orthogonal based multiple access cognitive radio's predominant transmission efficiency.
{"title":"Efficient usage of spectrum by using joint optimization channel allocation method","authors":"M. Mounisha, Chirunomula Sai Kowshik, M. Reethika, A. Dhanush","doi":"10.1109/CENTCON52345.2021.9688089","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688089","url":null,"abstract":"Traditionally cognitive radio can be accessed by secondary user only when foremost user is absent, but the subordinate client needs to evacuate the idle spectrum when existence of foremost user is detected. Hence, the bandwidth is reduced in traditional scheme. To overcome the problem, non-orthogonal multiple access is used to increase the efficiency of spectrum in 5G communications. Non-orthogonal multiple access is used in this method to allow the subordinate user to enter into the gamut even when forecast client is attending or not attending the conduit. Foremost client decryption technique and subordinate client decryption technique are introduced to decrypt the non-orthogonal signs. Hence, through the decoding techniques secondary user throughput can be achieved, to increase the primary user throughput duct channel energy must be in a limit. However due to the disturbance caused by the foremost client the subordinate efficiency may be decreased. Orienting towards Foremost user first deciphering and subordinate user first decoding, Here, we come up with two enhancement problems to enhance the efficiency of both primary client and secondary client. This is done using jointly optimizing spectrum resource. This citation embracing how much amount of sub channel transmission power is used and also, it enhances the number of sub channels present in it. This type of citation is to enhance optimization problems. Jointly optimization algorithm is introduced to eliminate the existing problem. This is achieved by accepting the signs and calculating the time needed to sense gamut and the forecast client attending or not attending the conduit to decrypt the data sent while forecast client is absent. The miniature outcomes will be shown the non-orthogonal based multiple access cognitive radio's predominant transmission efficiency.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127886448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9687930
T. Trueman, Gopi K, Ashok Kumar J
Artificial intelligence is replacing humans and their employment in different fields in today's technological environment. Researchers are trying to create virtual assistants and robots to mimic human characters as much as possible. Out of many impressive human characters, a sense of humor is a charming one. A virtual assistant or a robot with a great sense of humor will be a better replacement for an actual human. Moreover, natural language processing plays a vital role to capture the sense of humor from online texts. In this paper, we detect humor text from online media with help of a generalized autoregressive model. In specific, we fine-tuned the XLNet base to outperform other models in the same humor detection task with a 200k formal texts dataset. The proposed model applies context dependent features to capture the sense of humor. Our result analysis shows that our proposed work achieved an accuracy of 98.6% which is higher than existing models.
{"title":"Online Text-Based Humor Detection","authors":"T. Trueman, Gopi K, Ashok Kumar J","doi":"10.1109/CENTCON52345.2021.9687930","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687930","url":null,"abstract":"Artificial intelligence is replacing humans and their employment in different fields in today's technological environment. Researchers are trying to create virtual assistants and robots to mimic human characters as much as possible. Out of many impressive human characters, a sense of humor is a charming one. A virtual assistant or a robot with a great sense of humor will be a better replacement for an actual human. Moreover, natural language processing plays a vital role to capture the sense of humor from online texts. In this paper, we detect humor text from online media with help of a generalized autoregressive model. In specific, we fine-tuned the XLNet base to outperform other models in the same humor detection task with a 200k formal texts dataset. The proposed model applies context dependent features to capture the sense of humor. Our result analysis shows that our proposed work achieved an accuracy of 98.6% which is higher than existing models.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"258263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116419155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9688087
Leo Raj Solay, S. Anand, S. Amin, Pradeep Kumar
In this paper, Gate-All-Around (GAA) Charge Plasma (CP) Nanowire Field Effect Transistor (NW FET) structure design and analysis using Triple Material Gate (TMG) technique making it as a Gate-All-Around Triple Material Gate Charge Plasma Nanowire Field Effect Transistor (GAA TMG CP NW FET) is proposed. The proposed structure GAA TMG CP NW FET is compared with GAA Single Material Gate CP NW FET (GAA SMG CP NW FET) and GAA Double Material Gate CP NW FET (GAA DMG CP NW FET) structures. With the contrast made in between three structures i.e., SMG, DMG & TMG, the proposed structure GAA TMG CP NW FET resulted with promising outcomes in terms of ON-state current (ION), OFF-state current (IOFF) and their current ratios (ION/IOFF). The Analog and RF analysis were made for the proposed structure and compared with SMG & DMG which gave improved results such as Drain current with gate voltage (ID-VGS), Drain current with drain voltage (ID-VDS), Transconductance (gm), Output conductance (gd), Total gate capacitance (CGG) etc. The proposed device is then compared with the structure results such as Band energy, potential, electric field etc. A fair comparison is drawn from the SMG, DMG and TMG structures to prove its ability towards the Nanoscale device structures.
{"title":"Design And Analysis Of Gate-All-Around (GAA) Triple Material Gate Charge Plasma Nanowire FET","authors":"Leo Raj Solay, S. Anand, S. Amin, Pradeep Kumar","doi":"10.1109/CENTCON52345.2021.9688087","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9688087","url":null,"abstract":"In this paper, Gate-All-Around (GAA) Charge Plasma (CP) Nanowire Field Effect Transistor (NW FET) structure design and analysis using Triple Material Gate (TMG) technique making it as a Gate-All-Around Triple Material Gate Charge Plasma Nanowire Field Effect Transistor (GAA TMG CP NW FET) is proposed. The proposed structure GAA TMG CP NW FET is compared with GAA Single Material Gate CP NW FET (GAA SMG CP NW FET) and GAA Double Material Gate CP NW FET (GAA DMG CP NW FET) structures. With the contrast made in between three structures i.e., SMG, DMG & TMG, the proposed structure GAA TMG CP NW FET resulted with promising outcomes in terms of ON-state current (ION), OFF-state current (IOFF) and their current ratios (ION/IOFF). The Analog and RF analysis were made for the proposed structure and compared with SMG & DMG which gave improved results such as Drain current with gate voltage (ID-VGS), Drain current with drain voltage (ID-VDS), Transconductance (gm), Output conductance (gd), Total gate capacitance (CGG) etc. The proposed device is then compared with the structure results such as Band energy, potential, electric field etc. A fair comparison is drawn from the SMG, DMG and TMG structures to prove its ability towards the Nanoscale device structures.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127140955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-19DOI: 10.1109/CENTCON52345.2021.9687884
Sravanthi Kantamaneni, Charles, T. Babu
In this paper, one of the proposed ResNet model is used for denoising of RB noise. In fact, ResNet is one of the advanced deep learning methods for analysing and improving various 1D and 2D signals. Accuracy decreases due to the vanishing gradients in plain networks. The model Mozilla common speech data set is used. These are 48kHz recordings of all short sentence speaking subjects. They are all fixed at the same length and the same sampling frequency. The training course for this model uses an Adam optimizer/solver. This model is implemented in scheduling the learning rate “with a division” of 0.9 drop factor and a period of one. About 50 noise samples are available in the data set. Similarly, noise signals are acquired under various environmental conditions. Therefore, one separate data set is prepared for the T&T of the signal. When the T&T data set is small, the problem of overcompliance arises. In other words, since we are only trying to collect all data points from our dataset, we have used one proposed model to manage this dataset more efficiently. In the RMSE and precision validation values, you can feel the over- compliance issues here. Overfitting means that by 1 point of travel, the learning plot starts to deteriorate after loss and an increase in accuracy in terms of the identification. Similarly, if we are trying to pick a simple model for denoising, i.e. there is another problem - underfitting. Underfitting means that the model is either oversized or this model is oversized so that it doesn't learn enough about the dataset using that model. Each time various types of noises tries to rip off the amount added to the voice signal. Improvements in terms of denoising, RMSE and validation precision with the help of this model was given in the following sections.
{"title":"A Comparative Analysis of Progressive Loss Functions with Multi Layered Resnet Model","authors":"Sravanthi Kantamaneni, Charles, T. Babu","doi":"10.1109/CENTCON52345.2021.9687884","DOIUrl":"https://doi.org/10.1109/CENTCON52345.2021.9687884","url":null,"abstract":"In this paper, one of the proposed ResNet model is used for denoising of RB noise. In fact, ResNet is one of the advanced deep learning methods for analysing and improving various 1D and 2D signals. Accuracy decreases due to the vanishing gradients in plain networks. The model Mozilla common speech data set is used. These are 48kHz recordings of all short sentence speaking subjects. They are all fixed at the same length and the same sampling frequency. The training course for this model uses an Adam optimizer/solver. This model is implemented in scheduling the learning rate “with a division” of 0.9 drop factor and a period of one. About 50 noise samples are available in the data set. Similarly, noise signals are acquired under various environmental conditions. Therefore, one separate data set is prepared for the T&T of the signal. When the T&T data set is small, the problem of overcompliance arises. In other words, since we are only trying to collect all data points from our dataset, we have used one proposed model to manage this dataset more efficiently. In the RMSE and precision validation values, you can feel the over- compliance issues here. Overfitting means that by 1 point of travel, the learning plot starts to deteriorate after loss and an increase in accuracy in terms of the identification. Similarly, if we are trying to pick a simple model for denoising, i.e. there is another problem - underfitting. Underfitting means that the model is either oversized or this model is oversized so that it doesn't learn enough about the dataset using that model. Each time various types of noises tries to rip off the amount added to the voice signal. Improvements in terms of denoising, RMSE and validation precision with the help of this model was given in the following sections.","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134325157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}