Pub Date : 2020-10-09DOI: 10.1109/ICSTCEE49637.2020.9277221
Aruna Kumara B, M. Kodabagi
Email is one of the important means of communication over the Internet. Due to the rapid growth of Internet, usage of email communication for business, personal and other works has resulted into generation of electronic data in exponential order. Applying machine learning techniques on the huge raw data may degrade the performance. Hence, the data has to be prepared for better performance of the machine learning techniques. The preprocessing phase in machine learning applications such as classification, clustering and prediction is intended to reduce the size of data. This paper proposes a new data preprocessing approach for imbalanced data in email classification domain to measure the effects of various preprocessing methods on different machine learning classifiers. Contribution of various preprocessing methods on the imbalanced dataset is discussed. Accuracy analysis reveals that the proposed approach significantly improves the accuracy of all the machine learning classifiers used in this work. The outcome of this work showed that, success rate of logistic regression achieved 90.39% accuracy in the proposed approach.
{"title":"Efficient Data Preprocessing approach for Imbalanced Data in Email Classification System","authors":"Aruna Kumara B, M. Kodabagi","doi":"10.1109/ICSTCEE49637.2020.9277221","DOIUrl":"https://doi.org/10.1109/ICSTCEE49637.2020.9277221","url":null,"abstract":"Email is one of the important means of communication over the Internet. Due to the rapid growth of Internet, usage of email communication for business, personal and other works has resulted into generation of electronic data in exponential order. Applying machine learning techniques on the huge raw data may degrade the performance. Hence, the data has to be prepared for better performance of the machine learning techniques. The preprocessing phase in machine learning applications such as classification, clustering and prediction is intended to reduce the size of data. This paper proposes a new data preprocessing approach for imbalanced data in email classification domain to measure the effects of various preprocessing methods on different machine learning classifiers. Contribution of various preprocessing methods on the imbalanced dataset is discussed. Accuracy analysis reveals that the proposed approach significantly improves the accuracy of all the machine learning classifiers used in this work. The outcome of this work showed that, success rate of logistic regression achieved 90.39% accuracy in the proposed approach.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128881240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-09DOI: 10.1109/ICSTCEE49637.2020.9277397
Sateesh Kumar Adepu, G. M. Prasad, Hareesh Kumar Yada
In this paper, a simple controller is designed based on Inverse Park Phase-Locked Loop (IPPLL) for a multifunctional grid-connected solar photovoltaic system. The proposed IP-PLL tracks the grid voltage signal to estimate phase and quadrature signal generation to estimate magnitude and similarly, IP-QSG to estimate magnitude of load current signal. Implementing this PLL improves the accuracy of tracking the signal and also has filtering capabilities which in-turn improves power quality such as reactive power compensation, harmonic rejection and proper feeding of SPV energy etc. Incremental Conductance (INC) based maximum power point tracking (MPPT) is used for estimating the reference PV voltage signal and power. The IP-PLL based algorithm performs well under change in irradiance, grid disturbances such as sag/swells and also under load perturbations. These multifunctional capabilities of the grid-connected SPV make the overall system to be more efficient. These operating conditions are tested in MATLAB/Simulink platform.
{"title":"An Inverse Park Phase-Locked Loop based Control for Multifunctional Grid-Connected SPV System","authors":"Sateesh Kumar Adepu, G. M. Prasad, Hareesh Kumar Yada","doi":"10.1109/ICSTCEE49637.2020.9277397","DOIUrl":"https://doi.org/10.1109/ICSTCEE49637.2020.9277397","url":null,"abstract":"In this paper, a simple controller is designed based on Inverse Park Phase-Locked Loop (IPPLL) for a multifunctional grid-connected solar photovoltaic system. The proposed IP-PLL tracks the grid voltage signal to estimate phase and quadrature signal generation to estimate magnitude and similarly, IP-QSG to estimate magnitude of load current signal. Implementing this PLL improves the accuracy of tracking the signal and also has filtering capabilities which in-turn improves power quality such as reactive power compensation, harmonic rejection and proper feeding of SPV energy etc. Incremental Conductance (INC) based maximum power point tracking (MPPT) is used for estimating the reference PV voltage signal and power. The IP-PLL based algorithm performs well under change in irradiance, grid disturbances such as sag/swells and also under load perturbations. These multifunctional capabilities of the grid-connected SPV make the overall system to be more efficient. These operating conditions are tested in MATLAB/Simulink platform.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131608190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The massive technological revolution that has taken place and that is going on at a massive rate, has led to zillions of digital information traveling in a communication network. Information traveling in the network needs security and privacy. There are various cryptographic algorithms available today that can secure messages and data being communicated. Symmetric cryptography, though simple, does not provide authorization efficiently. Asymmetric cryptography proves to be more secure as it provides all the components of information security.With the breakthrough development on the Internet-of- Things (IOT), any digital device can become an originator of data. The main concern which arises is how to protect these data. With an accelerated usage of IoT environment, the security of data collected and stored by these devices has become more crucial.In this paper, we discuss two asymmetric algorithms NTRU (Nth degree truncated polynomial ring) and RSA (Rivest- Shamir-Adleman) in context of IoT. RSA is widely used but is heavy on key size and computation complexity. On the other hand, NTRU can give the same level of bit security with comparative key size and very less computational complexity. The captivity of NTRU algorithm lies in the fact that it works on simple polynomial operations. It is a NP-hard problem based on shortest vector problem (SVP) and is secure even for future quantum attacks. In a resource constrained environment like IoT environment, the performance of RSA and NTRU has been analyzed on the various security level parameters, viz. key generation, encryption and decryption time. Furthermore, performance of the various parameters has also been analyzed on various bits size plain text.
{"title":"NTRU and RSA Cryptosystems for Data Security in IoT Environment","authors":"Ankitha Nandanavanam, Ipsita Upasana, Nanditha Nandanavanam","doi":"10.1109/ICSTCEE49637.2020.9277159","DOIUrl":"https://doi.org/10.1109/ICSTCEE49637.2020.9277159","url":null,"abstract":"The massive technological revolution that has taken place and that is going on at a massive rate, has led to zillions of digital information traveling in a communication network. Information traveling in the network needs security and privacy. There are various cryptographic algorithms available today that can secure messages and data being communicated. Symmetric cryptography, though simple, does not provide authorization efficiently. Asymmetric cryptography proves to be more secure as it provides all the components of information security.With the breakthrough development on the Internet-of- Things (IOT), any digital device can become an originator of data. The main concern which arises is how to protect these data. With an accelerated usage of IoT environment, the security of data collected and stored by these devices has become more crucial.In this paper, we discuss two asymmetric algorithms NTRU (Nth degree truncated polynomial ring) and RSA (Rivest- Shamir-Adleman) in context of IoT. RSA is widely used but is heavy on key size and computation complexity. On the other hand, NTRU can give the same level of bit security with comparative key size and very less computational complexity. The captivity of NTRU algorithm lies in the fact that it works on simple polynomial operations. It is a NP-hard problem based on shortest vector problem (SVP) and is secure even for future quantum attacks. In a resource constrained environment like IoT environment, the performance of RSA and NTRU has been analyzed on the various security level parameters, viz. key generation, encryption and decryption time. Furthermore, performance of the various parameters has also been analyzed on various bits size plain text.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"295 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115929967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-09DOI: 10.1109/icstcee49637.2020.9277073
Anitha Sethumadhavan, Divya Mugunthan, Janani Sakthivel, Sujitha Venkatesan, Devi Priya Patturaja, D. Ganesh, Ram Dhiwakar Seetharaman, C. Raman, Mithileysh Sathiyanarayanan
Air pollution is a menacing issue in this current era. The atmosphere is composed of unwanted, non-efficient respiratory particles that are harmful to humans. The air people breathe is full of harmful contaminated particles resulting in many non-infectious respiratory diseases. The world-threatening COVID-19 pandemic has led the people to care about their personal hygiene and a mask is turning out to be an eminent requirement for every human to prevent the first stage of attack by the deadly coronavirus. Indeed, asthma is turning worse amidst humans, mostly because of these toxic and life-wrenching allergens that coexist in the atmosphere. To realize a knowledge-based sample a design of smart mask is proposed in the paper.
{"title":"Design of Smart Air Purifier Facial Mask","authors":"Anitha Sethumadhavan, Divya Mugunthan, Janani Sakthivel, Sujitha Venkatesan, Devi Priya Patturaja, D. Ganesh, Ram Dhiwakar Seetharaman, C. Raman, Mithileysh Sathiyanarayanan","doi":"10.1109/icstcee49637.2020.9277073","DOIUrl":"https://doi.org/10.1109/icstcee49637.2020.9277073","url":null,"abstract":"Air pollution is a menacing issue in this current era. The atmosphere is composed of unwanted, non-efficient respiratory particles that are harmful to humans. The air people breathe is full of harmful contaminated particles resulting in many non-infectious respiratory diseases. The world-threatening COVID-19 pandemic has led the people to care about their personal hygiene and a mask is turning out to be an eminent requirement for every human to prevent the first stage of attack by the deadly coronavirus. Indeed, asthma is turning worse amidst humans, mostly because of these toxic and life-wrenching allergens that coexist in the atmosphere. To realize a knowledge-based sample a design of smart mask is proposed in the paper.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-09DOI: 10.1109/ICSTCEE49637.2020.9276815
M. Anees, K. Rahul, Santosh Yachareni
This paper presents the study of impact from the conventional voltage based metric in designing SRAM in 7nm and advanced FinFet technology. Voltage based metric doesn’t provide the detail of charges that can be injected into the SRAM bitcell node before the bitcell node starts to flip, whereas current based (N-curve) approach gives a better insight which leads to designing of stable and robust SRAM bitcell. The study includes analyzing of bitcell metrics such as read stability and write ability to compare the voltage and current based approach.
{"title":"Study of bitcell qualification using current and voltage based metric’s in 7nm FinFet Technology","authors":"M. Anees, K. Rahul, Santosh Yachareni","doi":"10.1109/ICSTCEE49637.2020.9276815","DOIUrl":"https://doi.org/10.1109/ICSTCEE49637.2020.9276815","url":null,"abstract":"This paper presents the study of impact from the conventional voltage based metric in designing SRAM in 7nm and advanced FinFet technology. Voltage based metric doesn’t provide the detail of charges that can be injected into the SRAM bitcell node before the bitcell node starts to flip, whereas current based (N-curve) approach gives a better insight which leads to designing of stable and robust SRAM bitcell. The study includes analyzing of bitcell metrics such as read stability and write ability to compare the voltage and current based approach.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123425222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-09DOI: 10.1109/ICSTCEE49637.2020.9277374
Liyana Sahir Kallooriyakath, J. V., B. V, Adith P P
Given an image and a question in natural language based on the contents of the image, a Visual Question Answering system should model and produce an answer in natural language inferred from the information within the image. Visual question answering is a problem with increasing significance in the field of Artificial Intelligence as it lies in the crucial intersection between computer vision and natural language processing. Various methodologies have been proposed for obtaining a natural language answer to a user inputted question based on a given image. The purpose of this paper is to review various contemporary techniques for visual question answering. The advantages and limitations of these approaches are compared in this review. In addition, the areas for improvement within these approaches are discussed in this paper.
{"title":"Visual Question Answering: Methodologies and Challenges","authors":"Liyana Sahir Kallooriyakath, J. V., B. V, Adith P P","doi":"10.1109/ICSTCEE49637.2020.9277374","DOIUrl":"https://doi.org/10.1109/ICSTCEE49637.2020.9277374","url":null,"abstract":"Given an image and a question in natural language based on the contents of the image, a Visual Question Answering system should model and produce an answer in natural language inferred from the information within the image. Visual question answering is a problem with increasing significance in the field of Artificial Intelligence as it lies in the crucial intersection between computer vision and natural language processing. Various methodologies have been proposed for obtaining a natural language answer to a user inputted question based on a given image. The purpose of this paper is to review various contemporary techniques for visual question answering. The advantages and limitations of these approaches are compared in this review. In addition, the areas for improvement within these approaches are discussed in this paper.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117194170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-09DOI: 10.1109/ICSTCEE49637.2020.9277061
Vikramathithan A C, Sourabh V Bhat, S. R.
Mammogram plays a vital role on cancer detection in the breast. Computerized processing enhances readability of digital mammogram. Impulse noise is one of the major noise which affects mammogram. Duo-median filter is anticipated to removes high density impulse noise. The projected filter checks for impulse noise and replace the pixel value by median of 2x2 neighboring pixel value. Results of proposed algorithm are compared with median filter, adaptive median filter and super mean filter using various parameters such as peak signal to noise ratio and structural similarities for general image and mammogram. The proposed Duo-median shows significantly better result with AMF and SUMF for higher noise percentage.
{"title":"Denoising High Density Impulse Noise using Duo-Median Filter for Mammogram Images","authors":"Vikramathithan A C, Sourabh V Bhat, S. R.","doi":"10.1109/ICSTCEE49637.2020.9277061","DOIUrl":"https://doi.org/10.1109/ICSTCEE49637.2020.9277061","url":null,"abstract":"Mammogram plays a vital role on cancer detection in the breast. Computerized processing enhances readability of digital mammogram. Impulse noise is one of the major noise which affects mammogram. Duo-median filter is anticipated to removes high density impulse noise. The projected filter checks for impulse noise and replace the pixel value by median of 2x2 neighboring pixel value. Results of proposed algorithm are compared with median filter, adaptive median filter and super mean filter using various parameters such as peak signal to noise ratio and structural similarities for general image and mammogram. The proposed Duo-median shows significantly better result with AMF and SUMF for higher noise percentage.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125812880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-09DOI: 10.1109/ICSTCEE49637.2020.9277192
S. Banu, Shweta Gupta
Minimizing the leakage power has become one of the major concerns in low-voltage, low-power and high performance applications in VLSI involving CMOS circuits. The first part of this paper describes the need for low power and drawbacks in technology scaling and power components. The second part describes the various sources of leakage power and various techniques involved in reducing the same without affecting the performance. Various power reduction techniques can be employed at process and circuit level which includes Transistor stacking, Multiple threshold (MTCMOS), Dynamic threshold, Dual threshold, Variable threshold (VTCMOS), Pin-reordering, Supply voltage scaling & stacking techniques.
{"title":"The Sub-Threshold Leakage Reduction Techniques in CMOS Circuits","authors":"S. Banu, Shweta Gupta","doi":"10.1109/ICSTCEE49637.2020.9277192","DOIUrl":"https://doi.org/10.1109/ICSTCEE49637.2020.9277192","url":null,"abstract":"Minimizing the leakage power has become one of the major concerns in low-voltage, low-power and high performance applications in VLSI involving CMOS circuits. The first part of this paper describes the need for low power and drawbacks in technology scaling and power components. The second part describes the various sources of leakage power and various techniques involved in reducing the same without affecting the performance. Various power reduction techniques can be employed at process and circuit level which includes Transistor stacking, Multiple threshold (MTCMOS), Dynamic threshold, Dual threshold, Variable threshold (VTCMOS), Pin-reordering, Supply voltage scaling & stacking techniques.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130035914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-09DOI: 10.1109/ICSTCEE49637.2020.9276765
A. Khalyasmaa, S. Eroshenko, Duc Chung Tran
This paper is devoted to the problem of predicting electrical energy generation by photovoltaic power plants based on meteorological data from open sources using machine learning methods. The paper presents an overview of existing sources of meteorological data for solving the presented problem and possible methods for their processing, including a comparative analysis of the two most effective methods of machine learning application: ensemble algorithms and neural networks for generation forecasting of a real power plant in the Russian Federation.
{"title":"Very-short term forecasting of photovoltaic plants generation based on meteorological data from open sources using machine learning","authors":"A. Khalyasmaa, S. Eroshenko, Duc Chung Tran","doi":"10.1109/ICSTCEE49637.2020.9276765","DOIUrl":"https://doi.org/10.1109/ICSTCEE49637.2020.9276765","url":null,"abstract":"This paper is devoted to the problem of predicting electrical energy generation by photovoltaic power plants based on meteorological data from open sources using machine learning methods. The paper presents an overview of existing sources of meteorological data for solving the presented problem and possible methods for their processing, including a comparative analysis of the two most effective methods of machine learning application: ensemble algorithms and neural networks for generation forecasting of a real power plant in the Russian Federation.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130044629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-09DOI: 10.1109/ICSTCEE49637.2020.9277007
Javeria Ambareen, P. M, Tabassum Ara
Radio-frequency identification (RFID) has become a preferred technology for monitoring in industrial internet of things (IIoT) applications like supply chain, medical industry, vehicle tracking and warehouse monitoring where information is required continually. Typical security threats seen in these applications are denial of service (DOS) attack, transmission attack etc. We propose a novel edge data security schema based on spike modulation along with backscatter communication technique to modulate both sensor and identification (ID) information. It is observed that this data encoding schema works well even in a multi-tag single-reader environment. Further, it uses lower power and offers a low-cost solution for Industrial IoT applications.
{"title":"Edge Data Security for RFID-based Devices","authors":"Javeria Ambareen, P. M, Tabassum Ara","doi":"10.1109/ICSTCEE49637.2020.9277007","DOIUrl":"https://doi.org/10.1109/ICSTCEE49637.2020.9277007","url":null,"abstract":"Radio-frequency identification (RFID) has become a preferred technology for monitoring in industrial internet of things (IIoT) applications like supply chain, medical industry, vehicle tracking and warehouse monitoring where information is required continually. Typical security threats seen in these applications are denial of service (DOS) attack, transmission attack etc. We propose a novel edge data security schema based on spike modulation along with backscatter communication technique to modulate both sensor and identification (ID) information. It is observed that this data encoding schema works well even in a multi-tag single-reader environment. Further, it uses lower power and offers a low-cost solution for Industrial IoT applications.","PeriodicalId":113845,"journal":{"name":"2020 International Conference on Smart Technologies in Computing, Electrical and Electronics (ICSTCEE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129100445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}