Pub Date : 2020-12-01DOI: 10.1109/ICRAIE51050.2020.9358355
S. Hatim, S. J. Elias, Razizul Mohamad Ali, Jamaluddin Jasmis, A. Aziz, S. Mansor
The revolutionary of Internet of Things (IoT) is currently enabling the transformation of various existing research areas into new themes involving smart mobility, smart home, smart health and smart transport. Focusing on the smart transport, it actually leads towards the development of smart cities. For this purpose, Internet of Vehicles (IoV) is evolving, replacing the previous mobile-based vehicular adhoc network (VANET). This review paper presents a collective discovery on the IoV network model and the rational of introducing and implementing blockchain-based IoV (BIoV). BIoV is the solution to the basic IoV whereby it promises a secured and trusted network and connection to the users. Data stored in blockchain is transparent and users in the network need a key to download the relevant information. Thus, it is proved that blockchain is not easily can be breached by any attacks.
{"title":"Blockchain-based Internet of Vehicles (BIoV): An Approach Towards Smart Cities Development","authors":"S. Hatim, S. J. Elias, Razizul Mohamad Ali, Jamaluddin Jasmis, A. Aziz, S. Mansor","doi":"10.1109/ICRAIE51050.2020.9358355","DOIUrl":"https://doi.org/10.1109/ICRAIE51050.2020.9358355","url":null,"abstract":"The revolutionary of Internet of Things (IoT) is currently enabling the transformation of various existing research areas into new themes involving smart mobility, smart home, smart health and smart transport. Focusing on the smart transport, it actually leads towards the development of smart cities. For this purpose, Internet of Vehicles (IoV) is evolving, replacing the previous mobile-based vehicular adhoc network (VANET). This review paper presents a collective discovery on the IoV network model and the rational of introducing and implementing blockchain-based IoV (BIoV). BIoV is the solution to the basic IoV whereby it promises a secured and trusted network and connection to the users. Data stored in blockchain is transparent and users in the network need a key to download the relevant information. Thus, it is proved that blockchain is not easily can be breached by any attacks.","PeriodicalId":149717,"journal":{"name":"2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130178746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/icraie51050.2020.9358311
Glimpses of ICRAIE 2014
2014 年国际橡塑工业展览会掠影
{"title":"Glimpses of ICRAIE 2014","authors":"","doi":"10.1109/icraie51050.2020.9358311","DOIUrl":"https://doi.org/10.1109/icraie51050.2020.9358311","url":null,"abstract":"Glimpses of ICRAIE 2014","PeriodicalId":149717,"journal":{"name":"2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126302284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ICRAIE51050.2020.9358276
Deepti, A. Khunteta, A. Noonia
In this paper, a clustering algorithm named ICRA, which is based on Breadth first search approach has proposed. In this algorithm a new robust criterion NCN has introduced for deciding which vertex processing first from the list of vertices which are not present in any cluster. It efficiently mines the ordered sequences and update as well. This work is useful in community mining in social network analysis. The proposed algorithm is inspired by CRA algorithm, which does clustering twice. The proposed approach suits signed social networks too, and effectively mine negative vertices. In addition, this algorithm improves the predictive performance; especially for negative linked inter-communities datasets hence increases the accuracy when tested with the Gahuku - Gama dataset.
{"title":"An Efficient Two Stage Clustering Algorithm for Signed Social Networks","authors":"Deepti, A. Khunteta, A. Noonia","doi":"10.1109/ICRAIE51050.2020.9358276","DOIUrl":"https://doi.org/10.1109/ICRAIE51050.2020.9358276","url":null,"abstract":"In this paper, a clustering algorithm named ICRA, which is based on Breadth first search approach has proposed. In this algorithm a new robust criterion NCN has introduced for deciding which vertex processing first from the list of vertices which are not present in any cluster. It efficiently mines the ordered sequences and update as well. This work is useful in community mining in social network analysis. The proposed algorithm is inspired by CRA algorithm, which does clustering twice. The proposed approach suits signed social networks too, and effectively mine negative vertices. In addition, this algorithm improves the predictive performance; especially for negative linked inter-communities datasets hence increases the accuracy when tested with the Gahuku - Gama dataset.","PeriodicalId":149717,"journal":{"name":"2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"386 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126329799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ICRAIE51050.2020.9358381
Diksha Murlidhar Kharat, M. Morey
This paper presents a proposed model of Impedance-Sourced Inverter (ZSI) for the Three-Phase PV System which is further connected to the grid. ZSI implements shoot-through mode for controlling output voltage which differs from conventional VSI. Shoot through mode is implementing in ZSI for performing the buck-boost operation on Input Voltage by modification of the conventional PWM Technique. Power Conversion of Single Stage is achieved by the Z-source circuitry. Validation of output results is achieved by simulating the PV module in the MATLAB/Simulink platform.
{"title":"Solar PV fed Proposed Simple Boost Controlled Z-Source Inverter for Grid","authors":"Diksha Murlidhar Kharat, M. Morey","doi":"10.1109/ICRAIE51050.2020.9358381","DOIUrl":"https://doi.org/10.1109/ICRAIE51050.2020.9358381","url":null,"abstract":"This paper presents a proposed model of Impedance-Sourced Inverter (ZSI) for the Three-Phase PV System which is further connected to the grid. ZSI implements shoot-through mode for controlling output voltage which differs from conventional VSI. Shoot through mode is implementing in ZSI for performing the buck-boost operation on Input Voltage by modification of the conventional PWM Technique. Power Conversion of Single Stage is achieved by the Z-source circuitry. Validation of output results is achieved by simulating the PV module in the MATLAB/Simulink platform.","PeriodicalId":149717,"journal":{"name":"2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122264546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The emerging novel coronavirus (2019-nCoV) caused by a respiratory syndrome coronavirus 2 (SARS-CoV-2) is the lead cause of threat to life worldwide today. It is important to analyze the worldwide pandemic spread so that certain guide strategies can be set for complete situational awareness and application of conventional methodologies to control the impacts caused by it globally. This paper is composed of the visual exploratory data analysis of the countries based on the number of confirmed, recovered and death cases along with the comparative analysis of the mortality and recovery rate for nearly 222 nations worldwide. Also, K-means clustering is used to cluster the countries according to the number of confirmed and death cases. Hence, this study can be used to evaluate the rise of risks in a given area by comparing the count of the cases via visual analysis and work on the set up of some strategies to control its spread globally.
{"title":"Visual Exploratory Data Analysis of COVID-19 Pandemic","authors":"Sumindar Kaur Saini, Vishal Dhull, Sarbjeet Singh, Akashdeep Sharma","doi":"10.1109/ICRAIE51050.2020.9358331","DOIUrl":"https://doi.org/10.1109/ICRAIE51050.2020.9358331","url":null,"abstract":"The emerging novel coronavirus (2019-nCoV) caused by a respiratory syndrome coronavirus 2 (SARS-CoV-2) is the lead cause of threat to life worldwide today. It is important to analyze the worldwide pandemic spread so that certain guide strategies can be set for complete situational awareness and application of conventional methodologies to control the impacts caused by it globally. This paper is composed of the visual exploratory data analysis of the countries based on the number of confirmed, recovered and death cases along with the comparative analysis of the mortality and recovery rate for nearly 222 nations worldwide. Also, K-means clustering is used to cluster the countries according to the number of confirmed and death cases. Hence, this study can be used to evaluate the rise of risks in a given area by comparing the count of the cases via visual analysis and work on the set up of some strategies to control its spread globally.","PeriodicalId":149717,"journal":{"name":"2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115270332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ICRAIE51050.2020.9358348
A. Parihar
Image processing is a wide research area which contains various tasks. Image matting is an image processing tasks. The paper presents a study of various Image Matting approaches. The decomposition of an image into foreground using the opacity and background pixels is known as image matting. Inverse process of image matting is called image composition. It is used for extraction of foreground from an image. It can also produce new images with the help of extracted foreground and different background. It has a variety of applications, starting from image enhancement to extracting useful information from an image.
{"title":"A Study on Image Matting Techniques","authors":"A. Parihar","doi":"10.1109/ICRAIE51050.2020.9358348","DOIUrl":"https://doi.org/10.1109/ICRAIE51050.2020.9358348","url":null,"abstract":"Image processing is a wide research area which contains various tasks. Image matting is an image processing tasks. The paper presents a study of various Image Matting approaches. The decomposition of an image into foreground using the opacity and background pixels is known as image matting. Inverse process of image matting is called image composition. It is used for extraction of foreground from an image. It can also produce new images with the help of extracted foreground and different background. It has a variety of applications, starting from image enhancement to extracting useful information from an image.","PeriodicalId":149717,"journal":{"name":"2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"357 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125640919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ICRAIE51050.2020.9358343
Anil Singh Parihar, Aditya Kaushik, A. Choudhary, A. Singh
Synthesis of Images from text descriptions has emerged as an interesting albeit a challenging task in the domain of Image Synthesis. Many promising advances have been made in the direction of text-based image generation in the recent years, with the emergence of Multi-modal Generative Adversarial Networks. In this paper, we discuss the various approaches which utilise Conditional-GANs to accomplish the task of generating photo-realistic images based on their text descriptions and compare their architectures and performance on various benchmark datasets. The performance of these approaches are evaluated using various well-known metrics.
{"title":"A Primer on Conditional Text based Image Generation through Generative Models","authors":"Anil Singh Parihar, Aditya Kaushik, A. Choudhary, A. Singh","doi":"10.1109/ICRAIE51050.2020.9358343","DOIUrl":"https://doi.org/10.1109/ICRAIE51050.2020.9358343","url":null,"abstract":"Synthesis of Images from text descriptions has emerged as an interesting albeit a challenging task in the domain of Image Synthesis. Many promising advances have been made in the direction of text-based image generation in the recent years, with the emergence of Multi-modal Generative Adversarial Networks. In this paper, we discuss the various approaches which utilise Conditional-GANs to accomplish the task of generating photo-realistic images based on their text descriptions and compare their architectures and performance on various benchmark datasets. The performance of these approaches are evaluated using various well-known metrics.","PeriodicalId":149717,"journal":{"name":"2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131906840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ICRAIE51050.2020.9358372
Jeet K. Vora, Jaineel Purani, V. Shukla
This paper proposes a practical, low-cost circuit for the operation and control of a final control element (valve). The circuit presented in the paper uses an Infrared (IR) proximity sensor for object detection for triggering and 555 timer IC for precise time monitoring. The proposed system is intended to be used in soap and sanitizer dispensers installed at public places in this case in the university premises to assess the effectiveness. It may be proved very effective in mitigating the risk of the spread of Covid-19 due to the soap and sanitizer dispensers used at public places and the time monitoring capability of the proposed design allows the end-user to ensure the World Health Organization (WHO) guidelines for hand hygiene. Finally, theoretical concepts are validated using experimental results presented in the paper.
{"title":"Design of Novel Time Monitored Touchless Operation using 555 Timer for Automatic Dispenser","authors":"Jeet K. Vora, Jaineel Purani, V. Shukla","doi":"10.1109/ICRAIE51050.2020.9358372","DOIUrl":"https://doi.org/10.1109/ICRAIE51050.2020.9358372","url":null,"abstract":"This paper proposes a practical, low-cost circuit for the operation and control of a final control element (valve). The circuit presented in the paper uses an Infrared (IR) proximity sensor for object detection for triggering and 555 timer IC for precise time monitoring. The proposed system is intended to be used in soap and sanitizer dispensers installed at public places in this case in the university premises to assess the effectiveness. It may be proved very effective in mitigating the risk of the spread of Covid-19 due to the soap and sanitizer dispensers used at public places and the time monitoring capability of the proposed design allows the end-user to ensure the World Health Organization (WHO) guidelines for hand hygiene. Finally, theoretical concepts are validated using experimental results presented in the paper.","PeriodicalId":149717,"journal":{"name":"2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132597546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ICRAIE51050.2020.9358296
Manibha Sharma, J. Dhanoa
DFT (Design for Testability) is a methodology of testing for manufacturing defects in a chip. DFT consists of scan, ATPG (Automatic test pattern generation) methodologies and the BIST (Built in self-test) methods. This paper explores ATPG for pattern generation and LBIST (Logic built-in self-test) for testing. LBIST is explored and tested using pseudorandom test pattern generation. The fault list created for undetected faults are dumped into ATPG and fault specific test patterns are generated. These patterns detect the random pattern resistant faults (which are undetected by pseudorandom testing patterns). Further, a smart compression algorithm is defined to compress the pattern which can be stored inside the chip for LBIST testing, with no added memory overhead, and the minimum extra hardware (which only comprises of combinational logic). The proposed algorithm has been reviewed and analyzed and it has been found that the fault coverage achieved is 86.01%.
{"title":"Smart Logic Built in Self-Test in SOC","authors":"Manibha Sharma, J. Dhanoa","doi":"10.1109/ICRAIE51050.2020.9358296","DOIUrl":"https://doi.org/10.1109/ICRAIE51050.2020.9358296","url":null,"abstract":"DFT (Design for Testability) is a methodology of testing for manufacturing defects in a chip. DFT consists of scan, ATPG (Automatic test pattern generation) methodologies and the BIST (Built in self-test) methods. This paper explores ATPG for pattern generation and LBIST (Logic built-in self-test) for testing. LBIST is explored and tested using pseudorandom test pattern generation. The fault list created for undetected faults are dumped into ATPG and fault specific test patterns are generated. These patterns detect the random pattern resistant faults (which are undetected by pseudorandom testing patterns). Further, a smart compression algorithm is defined to compress the pattern which can be stored inside the chip for LBIST testing, with no added memory overhead, and the minimum extra hardware (which only comprises of combinational logic). The proposed algorithm has been reviewed and analyzed and it has been found that the fault coverage achieved is 86.01%.","PeriodicalId":149717,"journal":{"name":"2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114942802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-01DOI: 10.1109/ICRAIE51050.2020.9358273
PushpendraPratap Singh, M. R. Kumar Raja, A. Raj, M. A. Muqeet
Upgradation of programmable logic controller in terms of software is easy and economical but when it comes to hardware becomes complex and uneconomical as well. Replacement of any assembly line or carriage unit in PLC automation is time consuming and coast consuming. This paper giving an approach and implemented process chart to reduce time consuming and coast consumption of hardware change and replacement of PLC automation units. Here two conventional studies direct replacement indirect maintenance automation technique (DRIM) are compared with modern approaches of indirect replacement and direct maintenance (IRDM) automation technique. Here assembly sub unit is segmented in order to achieve better replacement taking care of economical aspect of maintenance and unit up gradation. Here direct and indirect methods are compared with their actual cost comparison and presenting a reliable time saving approach. An illustrative study about delaying in response has been given by comparing the process time to set value of the time. suggestive use of analog comparator in the place of digital comparator has been given in order to increase the fault analysis. Temperature based unit automation also presented in terms of temperature sensory unit replacement with normal temperature controller and heat actuators. Paper presents an analytical comparison study of solid iron structure base to the light and hollow allow structure with multiple division and rebated and jointed with nut and bolt system rather than direct welding
{"title":"Solution to Interfacing Problems of Programmable Logic Controller in Hardware Replacement","authors":"PushpendraPratap Singh, M. R. Kumar Raja, A. Raj, M. A. Muqeet","doi":"10.1109/ICRAIE51050.2020.9358273","DOIUrl":"https://doi.org/10.1109/ICRAIE51050.2020.9358273","url":null,"abstract":"Upgradation of programmable logic controller in terms of software is easy and economical but when it comes to hardware becomes complex and uneconomical as well. Replacement of any assembly line or carriage unit in PLC automation is time consuming and coast consuming. This paper giving an approach and implemented process chart to reduce time consuming and coast consumption of hardware change and replacement of PLC automation units. Here two conventional studies direct replacement indirect maintenance automation technique (DRIM) are compared with modern approaches of indirect replacement and direct maintenance (IRDM) automation technique. Here assembly sub unit is segmented in order to achieve better replacement taking care of economical aspect of maintenance and unit up gradation. Here direct and indirect methods are compared with their actual cost comparison and presenting a reliable time saving approach. An illustrative study about delaying in response has been given by comparing the process time to set value of the time. suggestive use of analog comparator in the place of digital comparator has been given in order to increase the fault analysis. Temperature based unit automation also presented in terms of temperature sensory unit replacement with normal temperature controller and heat actuators. Paper presents an analytical comparison study of solid iron structure base to the light and hollow allow structure with multiple division and rebated and jointed with nut and bolt system rather than direct welding","PeriodicalId":149717,"journal":{"name":"2020 5th IEEE International Conference on Recent Advances and Innovations in Engineering (ICRAIE)","volume":"22 6S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115944515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}