首页 > 最新文献

2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)最新文献

英文 中文
PAPR reduction of GFDM system using Parallel concatenation of LDPC codes 利用LDPC码并联降低GFDM系统的PAPR
N. Telagam, S. Lakshmi, K. Nehru
In this paper, we propose a peak to average power ratio (PAPR) reduction scheme for generalised frequency-division multiplexing (GFDM) systems based on parallel concatenation of low-density parity-check codes (PC-LDPC) codes. The proposed scheme maps the PC-LDPC codewords onto subcarriers to construct a symbol of channel coded GFDM. Then, these sub symbols are combined with subcarriers to form symbols, and these symbols are applied to the PAPR expression of the GFDM system for calculation. The BER value is higher at 10dB for the RRC filter-based GFDM system than the RC filter. The RC filter configuration has less BER at 10dB in 0.2 roll-off factor value with 100 iterations and 200 iterations in soft decision algorithm. When the value of Complementary Cumulative Distribution Function (CCDF) =0.001, the PC-LDPC GFDM system reduces the PAPR by 4 to 4.5 dB compared to the uncoded GFDM signal. The coding gain of 0.5dB is observed in Raised cosine pulse shaping filter with PC-LDPC codes.
本文提出了一种基于低密度奇偶校验码(PC-LDPC)码并行级联的广义频分复用(GFDM)系统的峰值平均功率比(PAPR)降低方案。该方案将PC-LDPC码字映射到子载波上,构造信道编码的GFDM符号。然后,将这些子符号与子载波组合成符号,并将这些符号应用到GFDM系统的PAPR表达式中进行计算。基于RRC滤波器的GFDM系统的误码率值在10dB时高于RC滤波器。RC滤波器配置在0.2滚降因子值下具有较低的10dB误码率,在软判决算法中具有100次迭代和200次迭代。当互补累积分布函数(CCDF)值=0.001时,PC-LDPC GFDM系统比未编码GFDM信号降低了4 ~ 4.5 dB的PAPR。在PC-LDPC码的凸余弦脉冲整形滤波器中观察到0.5dB的编码增益。
{"title":"PAPR reduction of GFDM system using Parallel concatenation of LDPC codes","authors":"N. Telagam, S. Lakshmi, K. Nehru","doi":"10.1109/ICAECC54045.2022.9716598","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716598","url":null,"abstract":"In this paper, we propose a peak to average power ratio (PAPR) reduction scheme for generalised frequency-division multiplexing (GFDM) systems based on parallel concatenation of low-density parity-check codes (PC-LDPC) codes. The proposed scheme maps the PC-LDPC codewords onto subcarriers to construct a symbol of channel coded GFDM. Then, these sub symbols are combined with subcarriers to form symbols, and these symbols are applied to the PAPR expression of the GFDM system for calculation. The BER value is higher at 10dB for the RRC filter-based GFDM system than the RC filter. The RC filter configuration has less BER at 10dB in 0.2 roll-off factor value with 100 iterations and 200 iterations in soft decision algorithm. When the value of Complementary Cumulative Distribution Function (CCDF) =0.001, the PC-LDPC GFDM system reduces the PAPR by 4 to 4.5 dB compared to the uncoded GFDM signal. The coding gain of 0.5dB is observed in Raised cosine pulse shaping filter with PC-LDPC codes.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129964869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Importance of Kaizen and Its Implementation in Design and Manufacturing System 设计与制造系统改善的重要性及其实施
K. Krupa, Sukumar Patil, Bhoopendra Singh
The objective of Design and Manufacturing companies is to increase customer satisfaction, productivity with good quality of products. At present many of the design and manufacturing companies are facing quality rejection, lead time issue and inability to meet the customer expectations. By implementing the lean manufacturing system, many problems can be solved by involving employees on the shop floor in Kaizen activities. One of the basic rules of Kaizen is “The continuous incremental improvement of an activity to create more value with less waste giving quantifiable and sustainable benefit”. The main objective of this paper is to provide background of Kaizen implementation in design and manufacturing areas.
设计和制造公司的目标是提高客户满意度,生产力与良好的产品质量。目前,许多设计和制造公司都面临着质量拒收、交货期问题和无法满足客户期望的问题。通过实施精益生产系统,许多问题可以通过让车间的员工参与到改善活动中来解决。改善的基本规则之一是“一项活动的持续增量改进,以更少的浪费创造更多的价值,并提供可量化和可持续的效益”。本文的主要目的是提供在设计和制造领域实施改善的背景。
{"title":"Importance of Kaizen and Its Implementation in Design and Manufacturing System","authors":"K. Krupa, Sukumar Patil, Bhoopendra Singh","doi":"10.1109/ICAECC54045.2022.9716625","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716625","url":null,"abstract":"The objective of Design and Manufacturing companies is to increase customer satisfaction, productivity with good quality of products. At present many of the design and manufacturing companies are facing quality rejection, lead time issue and inability to meet the customer expectations. By implementing the lean manufacturing system, many problems can be solved by involving employees on the shop floor in Kaizen activities. One of the basic rules of Kaizen is “The continuous incremental improvement of an activity to create more value with less waste giving quantifiable and sustainable benefit”. The main objective of this paper is to provide background of Kaizen implementation in design and manufacturing areas.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124129335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing different high speed adder architecture for Neural Networks 神经网络中不同高速加法器结构分析
Deekshith Krishnegowda
The first neural network model which was developed for image recognition application consisted of simple perceptrons. It had input, processing unit, and a single output. Neural networks which are used in today’s world consist of many complex MAC (Multiply and Accumulate) units. Be it the simple pattern recognition neural network model or complex models used for autonomous driving applications; adders are used for computing the activation point of neurons. Some adders offer better performance at the cost of area and power while some offer better power at the cost of performance. So, choosing the right type of adder architecture based upon the application becomes a very important criterion when we are trying to develop an inference engine for the neural network in hardware. To determine weight or activation point of a neuron, typically, float32 or float64 number representation is used. Float64 offers better accuracy than float32 but the drawback of using float64 is that it requires huge computation power. So, in this manuscript we compare different high-speed adder topologies, then discuss the implementation of an optimized 64-bit conditional sum and carry select adder that can be used to implement Deep Neural Network with float64 number representation. Analysis between different adder architecture is performed using Synopsys Design Compiler with 45nm Toshiba library for three different metrics: Timing, Area, and Power.
第一个用于图像识别应用的神经网络模型是由简单的感知器组成的。它有输入、处理单元和一个输出。当今世界上使用的神经网络由许多复杂的MAC(乘法和累加)单元组成。无论是简单的模式识别神经网络模型还是用于自动驾驶应用的复杂模型;加法器用于计算神经元的激活点。有些加法器以面积和功率为代价提供更好的性能,而有些则以性能为代价提供更好的功率。因此,在硬件上为神经网络开发推理引擎时,根据应用选择合适的加法器结构就成为一个非常重要的标准。为了确定神经元的权重或激活点,通常使用float32或float64数字表示。Float64提供比float32更好的精度,但使用Float64的缺点是它需要巨大的计算能力。因此,在本文中,我们比较了不同的高速加法器拓扑,然后讨论了一个优化的64位条件和进位选择加法器的实现,该加法器可用于实现具有float64数字表示的深度神经网络。不同加法器架构之间的分析使用Synopsys设计编译器与45纳米东芝库进行三个不同的指标:时序,面积和功耗。
{"title":"Analyzing different high speed adder architecture for Neural Networks","authors":"Deekshith Krishnegowda","doi":"10.1109/ICAECC54045.2022.9716643","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716643","url":null,"abstract":"The first neural network model which was developed for image recognition application consisted of simple perceptrons. It had input, processing unit, and a single output. Neural networks which are used in today’s world consist of many complex MAC (Multiply and Accumulate) units. Be it the simple pattern recognition neural network model or complex models used for autonomous driving applications; adders are used for computing the activation point of neurons. Some adders offer better performance at the cost of area and power while some offer better power at the cost of performance. So, choosing the right type of adder architecture based upon the application becomes a very important criterion when we are trying to develop an inference engine for the neural network in hardware. To determine weight or activation point of a neuron, typically, float32 or float64 number representation is used. Float64 offers better accuracy than float32 but the drawback of using float64 is that it requires huge computation power. So, in this manuscript we compare different high-speed adder topologies, then discuss the implementation of an optimized 64-bit conditional sum and carry select adder that can be used to implement Deep Neural Network with float64 number representation. Analysis between different adder architecture is performed using Synopsys Design Compiler with 45nm Toshiba library for three different metrics: Timing, Area, and Power.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Proposed Algorithm to Perform Few Shot Learning with different sampling sizes 一种不同采样大小的少镜头学习算法
Kashvi Dedhia, Mallika Konkar, Dhruvil Shah, Prachi Tawde
Often times there is scarcity when it comes to model training of a quality dataset. Sometimes the data that is available is unlabelled, sometimes very few samples are available for some classes. In these cases, few shot learning comes in handy. There are two approaches to few shot learning Data Level approach and Parameter Level approach. The paper consists of analysis of the number of training samples using parameter level approach. Two classes have been used to perform few shot learning. Meta transfer learning is being used, by initialising the parameters of convolutional neutral networks (CNN) learner model from a model trained on ImageNet. It has been performed incrementally on datasets of various sizes. The results and performance of all the models are compared to the results when the entire dataset is used. As well as the advantages of using few shot learning. It has found its applications in a wide range of fields mainly computer vision, natural language processing etc.
当涉及到高质量数据集的模型训练时,通常存在稀缺性。有时可用的数据是未标记的,有时对于某些类可用的样本很少。在这些情况下,很少有射击学习能派上用场。少球学习有两种方法:数据级方法和参数级方法。本文采用参数水平法对训练样本数量进行了分析。两个类已经被用来执行一些射击学习。使用元迁移学习,从ImageNet上训练的模型初始化卷积神经网络(CNN)学习器模型的参数。它已经在不同大小的数据集上逐步执行。将所有模型的结果和性能与使用整个数据集时的结果进行比较。以及使用少枪学习的优点。它在计算机视觉、自然语言处理等领域有着广泛的应用。
{"title":"A Proposed Algorithm to Perform Few Shot Learning with different sampling sizes","authors":"Kashvi Dedhia, Mallika Konkar, Dhruvil Shah, Prachi Tawde","doi":"10.1109/ICAECC54045.2022.9716609","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716609","url":null,"abstract":"Often times there is scarcity when it comes to model training of a quality dataset. Sometimes the data that is available is unlabelled, sometimes very few samples are available for some classes. In these cases, few shot learning comes in handy. There are two approaches to few shot learning Data Level approach and Parameter Level approach. The paper consists of analysis of the number of training samples using parameter level approach. Two classes have been used to perform few shot learning. Meta transfer learning is being used, by initialising the parameters of convolutional neutral networks (CNN) learner model from a model trained on ImageNet. It has been performed incrementally on datasets of various sizes. The results and performance of all the models are compared to the results when the entire dataset is used. As well as the advantages of using few shot learning. It has found its applications in a wide range of fields mainly computer vision, natural language processing etc.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115045243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cryptography based Face Authentication System for Secured Communication 一种基于密码学的安全通信人脸认证系统
Ba Ajeethra, Sv Gautham Prasath, R. Arun Balaji, K. A. Kumar
Digital communication and networking had become an integral part of our everyday life. Technological advancements in Digital networking must also include security and confidentiality paradigms. Several previous works on communication systems comprised the problem of storage, sharing, and complexity of keys. On considering the mentioned problems of existing works, this paper proposes secure communication using cryptography and face recognition techniques with cloud computing. The proposed system pertains to a protected communication process, where messages are entitled only after the verification of the authorized sender and receiver using Linear Binary Pattern Histogram (LBPH) face recognition, and Rivest, Shamir, Adleman (RSA) cryptographic technique with the cloud management system. The system generates RSA key pair, which is exported as a Privacy- Enhanced Mail (PEM) file and stored in a remote server through a Secure Shell (SSH) tunnel.The proposed system has found that using 50 samples for face authentication is most efficient and accurate with limited time. Existing works have focused to increase security by adding layers of encryption which in turn increased the complexity to handle keys and decryption processes. This proposed methodology on following a biometric authentication system, stretches itself with an extra efficient layer of security without increasing the complexity of the system.
数字通信和网络已经成为我们日常生活中不可或缺的一部分。数字网络的技术进步也必须包括安全和保密范例。以前关于通信系统的几项工作包含了密钥的存储、共享和复杂性问题。在考虑到现有工作中存在的问题的基础上,本文提出了基于云计算的加密技术和人脸识别技术的安全通信。所提出的系统适用于受保护的通信过程,其中消息只有在使用线性二进制模式直方图(LBPH)人脸识别和Rivest, Shamir, Adleman (RSA)加密技术与云管理系统验证授权发送方和接收方后才有权。系统生成RSA密钥对,导出为PEM (Privacy- Enhanced Mail)文件,通过SSH (Secure Shell)隧道保存在远程服务器上。该系统发现,在有限的时间内,使用50个样本进行人脸认证是最有效和准确的。现有的工作主要是通过增加加密层来提高安全性,这反过来又增加了处理密钥和解密过程的复杂性。该方法在遵循生物识别认证系统的基础上,在不增加系统复杂性的情况下,提供了一个更有效的安全层。
{"title":"A Cryptography based Face Authentication System for Secured Communication","authors":"Ba Ajeethra, Sv Gautham Prasath, R. Arun Balaji, K. A. Kumar","doi":"10.1109/ICAECC54045.2022.9716676","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716676","url":null,"abstract":"Digital communication and networking had become an integral part of our everyday life. Technological advancements in Digital networking must also include security and confidentiality paradigms. Several previous works on communication systems comprised the problem of storage, sharing, and complexity of keys. On considering the mentioned problems of existing works, this paper proposes secure communication using cryptography and face recognition techniques with cloud computing. The proposed system pertains to a protected communication process, where messages are entitled only after the verification of the authorized sender and receiver using Linear Binary Pattern Histogram (LBPH) face recognition, and Rivest, Shamir, Adleman (RSA) cryptographic technique with the cloud management system. The system generates RSA key pair, which is exported as a Privacy- Enhanced Mail (PEM) file and stored in a remote server through a Secure Shell (SSH) tunnel.The proposed system has found that using 50 samples for face authentication is most efficient and accurate with limited time. Existing works have focused to increase security by adding layers of encryption which in turn increased the complexity to handle keys and decryption processes. This proposed methodology on following a biometric authentication system, stretches itself with an extra efficient layer of security without increasing the complexity of the system.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129182098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware and Software method to Reduce Power Consumption in Battery Operated IoT Devices 降低电池供电物联网设备功耗的硬件和软件方法
K. Sudharshan, A. R. Bhavya
With IoT applications being extensively used in our day to day lives, managing the power consumption of IoT devices has become a genuine concern. Specifically, IoT devices that are used in remote locations without grid availability poses a more difficult challenge in managing power consumption. Since IoT devices are usually compact and the batteries used in these are smaller ones like coin cells and prismatic cells, their mili ampere hour is as low as 150mah and expected operating life is up to 2 years. To reach battery life of 2 years it is essential to operate the device in low power modes of the processor while also performing the function seamlessly. This research is targeted towards identifying various methodologies that assists in the reduction of power consumption in Battery operated IoT devices, especially in the IoT processor via hardware and firmware protocols.
随着物联网应用在我们的日常生活中被广泛使用,管理物联网设备的功耗已经成为一个真正的问题。具体来说,在没有电网可用性的远程位置使用的物联网设备在管理功耗方面提出了更困难的挑战。由于物联网设备通常紧凑,其中使用的电池较小,如硬币电池和棱柱电池,它们的毫安小时低至150mah,预期工作寿命长达2年。为了达到2年的电池寿命,必须在处理器的低功耗模式下操作设备,同时无缝地执行功能。本研究旨在确定各种方法,以帮助减少电池供电的物联网设备的功耗,特别是通过硬件和固件协议在物联网处理器中。
{"title":"Hardware and Software method to Reduce Power Consumption in Battery Operated IoT Devices","authors":"K. Sudharshan, A. R. Bhavya","doi":"10.1109/ICAECC54045.2022.9716644","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716644","url":null,"abstract":"With IoT applications being extensively used in our day to day lives, managing the power consumption of IoT devices has become a genuine concern. Specifically, IoT devices that are used in remote locations without grid availability poses a more difficult challenge in managing power consumption. Since IoT devices are usually compact and the batteries used in these are smaller ones like coin cells and prismatic cells, their mili ampere hour is as low as 150mah and expected operating life is up to 2 years. To reach battery life of 2 years it is essential to operate the device in low power modes of the processor while also performing the function seamlessly. This research is targeted towards identifying various methodologies that assists in the reduction of power consumption in Battery operated IoT devices, especially in the IoT processor via hardware and firmware protocols.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126928036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
OpenGL Based Simulation Test Bed for Aircraft Ground Telemetry System using Antenna Beam Forming 基于OpenGL的天线波束成形飞机地面遥测系统仿真试验台
Mangu Aman Surya, P. H. Lakshmi, Kuruganti Madhu Sri, Amancherla Shanmukha Sai Saketh, Devendra J Patra Kailash, P. Tarun Sai, Parul Mathur, Vineetha Jain, Dhanesh G-Kurup
A simulation test-bed based on OpenGL graphics tool is developed for studying the telemetry communication link of aircraft with ground station. The smooth aircraft movement has been implemented using cubic spline algorithm and antenna beamforming algorithms has been used to track the aircraft movement by estimating the AoA (Angle of Arrival). The paper compares the performances of LMS (Least Mean Square) and RLS (Recursive Least Square) antenna beamforming algorithms to track the movement of aircraft in the presence of noise. The simulation test-bed was able to track the aircraft movement successfully for AOA of less than 75° with signal to noise ratio of more than 4dB.
为研究飞机与地面站遥测通信链路,开发了基于OpenGL图形工具的仿真试验台。利用三次样条算法实现了飞行器的平滑运动,利用天线波束形成算法通过估计到达角来跟踪飞行器的运动。比较了LMS(最小均方)和RLS(递推最小二乘)天线波束形成算法在噪声环境下跟踪飞机运动的性能。仿真试验台在AOA小于75°、信噪比大于4dB的情况下,能够成功跟踪飞机运动。
{"title":"OpenGL Based Simulation Test Bed for Aircraft Ground Telemetry System using Antenna Beam Forming","authors":"Mangu Aman Surya, P. H. Lakshmi, Kuruganti Madhu Sri, Amancherla Shanmukha Sai Saketh, Devendra J Patra Kailash, P. Tarun Sai, Parul Mathur, Vineetha Jain, Dhanesh G-Kurup","doi":"10.1109/ICAECC54045.2022.9716602","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716602","url":null,"abstract":"A simulation test-bed based on OpenGL graphics tool is developed for studying the telemetry communication link of aircraft with ground station. The smooth aircraft movement has been implemented using cubic spline algorithm and antenna beamforming algorithms has been used to track the aircraft movement by estimating the AoA (Angle of Arrival). The paper compares the performances of LMS (Least Mean Square) and RLS (Recursive Least Square) antenna beamforming algorithms to track the movement of aircraft in the presence of noise. The simulation test-bed was able to track the aircraft movement successfully for AOA of less than 75° with signal to noise ratio of more than 4dB.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115270186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Recognition Using Machine Learning Models - Comparative Analysis and impact of dimensionality reduction 使用机器学习模型的人脸识别-降维的比较分析和影响
P. Yaswanthram, B. A. Sabarish
Face Recognition is considered a biometric technique where it is capable of uniquely identifying and verifying a person just by analysing and comparing the facial patterns on the facial contours. Face Recognition has gained significant importance in security aspects and it has been widely used and accepted biometric. It has given greater importance during pandemic situations in terms of cheapest and widely accepted touchless biometrics. This paper studies the impact of dimensionality reduction on the efficiency or accuracy of machine learning algorithms in face recognition. The analysis is carried out over various algorithms include Random Forests, Support Vector Machine, Linear Regression, Logistic Regression, K-Nearest Neighbor. Based on the analysis, Logistic Regression gives better performance in terms of accuracy and time with an accuracy score of 0.97 within a time of 5.74 sec when implemented without principal component analysis whereas with principal component analysis, Logistic Regression achieved an accuracy score of 0.93 within a time of 0. 15sec. There is a huge difference in computation time approximately 20 times, the difference in accuracy is minimal.
人脸识别被认为是一种生物识别技术,它能够通过分析和比较面部轮廓上的面部模式来唯一地识别和验证一个人。人脸识别在安全领域具有重要意义,是一种被广泛应用和接受的生物识别技术。在大流行情况下,就最便宜和广泛接受的非接触式生物识别技术而言,它具有更大的重要性。本文研究了降维对人脸识别中机器学习算法效率或准确性的影响。通过随机森林、支持向量机、线性回归、逻辑回归、k近邻等算法进行分析。通过分析,Logistic回归在准确率和时间方面表现更好,在没有主成分分析的情况下,在5.74秒的时间内,Logistic回归的准确率得分为0.97,而在有主成分分析的情况下,Logistic回归在0秒的时间内,准确率得分为0.93。15秒。两者在计算时间上的巨大差异约为20倍,在精度上的差异极小。
{"title":"Face Recognition Using Machine Learning Models - Comparative Analysis and impact of dimensionality reduction","authors":"P. Yaswanthram, B. A. Sabarish","doi":"10.1109/ICAECC54045.2022.9716590","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716590","url":null,"abstract":"Face Recognition is considered a biometric technique where it is capable of uniquely identifying and verifying a person just by analysing and comparing the facial patterns on the facial contours. Face Recognition has gained significant importance in security aspects and it has been widely used and accepted biometric. It has given greater importance during pandemic situations in terms of cheapest and widely accepted touchless biometrics. This paper studies the impact of dimensionality reduction on the efficiency or accuracy of machine learning algorithms in face recognition. The analysis is carried out over various algorithms include Random Forests, Support Vector Machine, Linear Regression, Logistic Regression, K-Nearest Neighbor. Based on the analysis, Logistic Regression gives better performance in terms of accuracy and time with an accuracy score of 0.97 within a time of 5.74 sec when implemented without principal component analysis whereas with principal component analysis, Logistic Regression achieved an accuracy score of 0.93 within a time of 0. 15sec. There is a huge difference in computation time approximately 20 times, the difference in accuracy is minimal.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115937496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Defects Determination and Diagnosis in Bare Dice for High Reliable Hybrid Microcircuits 高可靠性混合微电路裸片缺陷的检测与诊断
Suma S. Lonkadi, V. Varalakshmi, S. Raviprakash, Kamaljeet Singh, A. V. Nirmal
Defects visualization in bare chips and dice are important for realization of high reliable aerospace systems. Various defects such as cracks, voids, delamination, chip outs, dis-coloration, deep scratches can be detrimental in long term reliability of the Hybrid Microcircuits (HMCs). In spite of various standards in the realization of dice as well as various inspection formulating methodologies still probability of defects induced during fabrication and packaging need to be critically examined. Further handling and assembly of the dice can also induce certain defects due to various stresses which will impact on product quality. This paper provides an overview of various visual defects observed in bare dice and further tests and analysis to know the impact on electronic fabrication process.
裸片和裸片的缺陷可视化是实现航天系统高可靠性的重要手段。各种缺陷,如裂纹、空洞、分层、脱落、变色、深划痕等,都可能对混合微电路(hmc)的长期可靠性有害。尽管在骰子的实现中有各种各样的标准以及各种检验制定方法,但在制造和包装过程中产生缺陷的概率仍然需要严格检查。骰子的进一步处理和组装也会由于各种应力而导致某些缺陷,从而影响产品质量。本文概述了裸片中观察到的各种视觉缺陷,并进行了进一步的测试和分析,以了解其对电子制造过程的影响。
{"title":"Defects Determination and Diagnosis in Bare Dice for High Reliable Hybrid Microcircuits","authors":"Suma S. Lonkadi, V. Varalakshmi, S. Raviprakash, Kamaljeet Singh, A. V. Nirmal","doi":"10.1109/ICAECC54045.2022.9716627","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716627","url":null,"abstract":"Defects visualization in bare chips and dice are important for realization of high reliable aerospace systems. Various defects such as cracks, voids, delamination, chip outs, dis-coloration, deep scratches can be detrimental in long term reliability of the Hybrid Microcircuits (HMCs). In spite of various standards in the realization of dice as well as various inspection formulating methodologies still probability of defects induced during fabrication and packaging need to be critically examined. Further handling and assembly of the dice can also induce certain defects due to various stresses which will impact on product quality. This paper provides an overview of various visual defects observed in bare dice and further tests and analysis to know the impact on electronic fabrication process.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115461703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSTM based Deep Learning Technique to Forecast Internet of Things Attacks in MQTT Protocol 基于LSTM的深度学习技术预测MQTT协议中的物联网攻击
S. Thavamani, U. Sinthuja
Internet of Things networks are becoming more popular for monitoring critical environments of various types, resulting in a large increase in the amount of data transmitted. Because of the large number of linked IoT devices, network and security protocols is a major concern. In the sphere of security, detection systems play a critical role: they are based on cutting-edge algorithms. They can recognize or forecast security attacks using techniques such as machine learning, allowing them to secure the underpinning system. We have depicted some of the Deep Learning based techniques and figured out the best technique called Long Short Term Memory (LSTM) with 87% of accuracy to build the Artificial Intelligence based Interpolation Technique for IoT Environment.
物联网网络越来越多地用于监控各种类型的关键环境,导致数据传输量大幅增加。由于大量连接的物联网设备,网络和安全协议是一个主要问题。在安全领域,检测系统起着至关重要的作用:它们基于尖端的算法。他们可以使用机器学习等技术识别或预测安全攻击,从而使他们能够保护基础系统。我们描述了一些基于深度学习的技术,并找出了长短期记忆(LSTM)的最佳技术,其准确度为87%,用于构建物联网环境中基于人工智能的插值技术。
{"title":"LSTM based Deep Learning Technique to Forecast Internet of Things Attacks in MQTT Protocol","authors":"S. Thavamani, U. Sinthuja","doi":"10.1109/ICAECC54045.2022.9716585","DOIUrl":"https://doi.org/10.1109/ICAECC54045.2022.9716585","url":null,"abstract":"Internet of Things networks are becoming more popular for monitoring critical environments of various types, resulting in a large increase in the amount of data transmitted. Because of the large number of linked IoT devices, network and security protocols is a major concern. In the sphere of security, detection systems play a critical role: they are based on cutting-edge algorithms. They can recognize or forecast security attacks using techniques such as machine learning, allowing them to secure the underpinning system. We have depicted some of the Deep Learning based techniques and figured out the best technique called Long Short Term Memory (LSTM) with 87% of accuracy to build the Artificial Intelligence based Interpolation Technique for IoT Environment.","PeriodicalId":199351,"journal":{"name":"2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128411995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1