Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060291
Suryanarayan Sharma, Upendra Singh Yadav, S. K. Srivastava
This paper examines some of the potential dangers associated with electric vehicles, as well as how European Union and UN type-approval procedures lessen the risks to users. It does so by highlighting any regulatory loopholes as well as the international initiatives now ongoing to remedy them. The main focus of this research paper is on vehicle dangers, with some thought given to how they are likely to be exploited by the general population. Infrastructure-related hazards, such as vehicle charging or battery exchange, are often excluded since they are likely to come under a different regulatory framework.
{"title":"Safety and Cost Analysis of Electric Vehicle","authors":"Suryanarayan Sharma, Upendra Singh Yadav, S. K. Srivastava","doi":"10.1109/ICERECT56837.2022.10060291","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060291","url":null,"abstract":"This paper examines some of the potential dangers associated with electric vehicles, as well as how European Union and UN type-approval procedures lessen the risks to users. It does so by highlighting any regulatory loopholes as well as the international initiatives now ongoing to remedy them. The main focus of this research paper is on vehicle dangers, with some thought given to how they are likely to be exploited by the general population. Infrastructure-related hazards, such as vehicle charging or battery exchange, are often excluded since they are likely to come under a different regulatory framework.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"63 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125998357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060495
Rupal Gupta, A. Babu
Speech enhancement entails improving speech that has been damaged by noise. Speech enhancement increases a speaker's ability to be understood by human listeners. Recent years have seen a huge increase in interest in deep learning techniques for improving speech, which require both clear and noisy speech for training. However, it can be difficult to get a clear speech signal in realistic situations. Speech enhancement entails improving speech that has been damaged by noise. Speech enhancement increases a speaker's ability to be understood by human listeners. Recent years have seen a huge increase in interest in deep learning techniques for improving speech, which require both clear and noisy speech for training. However, it can be difficult to get a clear speech signal in realistic situations. The testing results address the convenience of the created SE application in uproarious environmental elements and show prominent progressions over the best in class philosophies.
{"title":"Modelling of A Speech Enhancement Techniques Using CNN Approach","authors":"Rupal Gupta, A. Babu","doi":"10.1109/ICERECT56837.2022.10060495","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060495","url":null,"abstract":"Speech enhancement entails improving speech that has been damaged by noise. Speech enhancement increases a speaker's ability to be understood by human listeners. Recent years have seen a huge increase in interest in deep learning techniques for improving speech, which require both clear and noisy speech for training. However, it can be difficult to get a clear speech signal in realistic situations. Speech enhancement entails improving speech that has been damaged by noise. Speech enhancement increases a speaker's ability to be understood by human listeners. Recent years have seen a huge increase in interest in deep learning techniques for improving speech, which require both clear and noisy speech for training. However, it can be difficult to get a clear speech signal in realistic situations. The testing results address the convenience of the created SE application in uproarious environmental elements and show prominent progressions over the best in class philosophies.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126711296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060207
Shylaja N S, B. Pandey
In today's scenario Artificial Intelligence (AI), Machine learning, Deep learning, Cloud Computing and the Internet of Things (IoT) are considered to be new methodologies to resolve variations in real-life issues. These methods are significantly used in different industries such as transportation schemes, smart cities, healthcare systems, and agriculture to offer fertile outcomes for lots of problems in today's situation. Cloud computing is an authoritative device to optimize the price in terms of utility, manageability, and hardware for distributing the information, because of the aforementioned features most association convert their services and applications to the cloud. However, some malware ransom ware is difficult to detect without running them. The security information groups endure improving advanced procedures for encryption augmented to cloud facilities. This research focused on malware detection and resolving the security problems in cloud computing by using encryption techniques. The countermeasures for separate susceptibility are based on the investigation outcomes discussed. This comprehensive research supports the researchers in accomplishing a better solution for malware detection on cloud computing)
{"title":"Encryption-based Malware Detection for Cloud Computing","authors":"Shylaja N S, B. Pandey","doi":"10.1109/ICERECT56837.2022.10060207","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060207","url":null,"abstract":"In today's scenario Artificial Intelligence (AI), Machine learning, Deep learning, Cloud Computing and the Internet of Things (IoT) are considered to be new methodologies to resolve variations in real-life issues. These methods are significantly used in different industries such as transportation schemes, smart cities, healthcare systems, and agriculture to offer fertile outcomes for lots of problems in today's situation. Cloud computing is an authoritative device to optimize the price in terms of utility, manageability, and hardware for distributing the information, because of the aforementioned features most association convert their services and applications to the cloud. However, some malware ransom ware is difficult to detect without running them. The security information groups endure improving advanced procedures for encryption augmented to cloud facilities. This research focused on malware detection and resolving the security problems in cloud computing by using encryption techniques. The countermeasures for separate susceptibility are based on the investigation outcomes discussed. This comprehensive research supports the researchers in accomplishing a better solution for malware detection on cloud computing)","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10059843
Anjana Jalannavar, Suvarna G. Kanakaraddi, Vidya S. Handur
A migraine is a headache which could reason very terrible palpitate ache, commonly on one part of the head. Symptoms of migraine are nausea, vomiting, and intense sensitivity to brightness and sound. Migraine attacks that may cause for hours to days, and the ache may be so intense that it interferes with each day ventures. Migraine and episodic headache are one of the most common kinds of primary headache. Migraine is considered as a severe health trouble that impacts the pleasant life. Migraines, which have an effect on youngsters and teens in addition to adults, can developed via 4 stages: prodrome, atmosphere(aura), charge and post-drome. Not everybody who has migraines is going via all stages. The paper tries to focus on the migraine prediction by the use of deep learning model. This paper proposes or provides a Machine Learning technique and model to discover the sort of migraine.
{"title":"Migraine Prediction Using Deep Learning Model","authors":"Anjana Jalannavar, Suvarna G. Kanakaraddi, Vidya S. Handur","doi":"10.1109/ICERECT56837.2022.10059843","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059843","url":null,"abstract":"A migraine is a headache which could reason very terrible palpitate ache, commonly on one part of the head. Symptoms of migraine are nausea, vomiting, and intense sensitivity to brightness and sound. Migraine attacks that may cause for hours to days, and the ache may be so intense that it interferes with each day ventures. Migraine and episodic headache are one of the most common kinds of primary headache. Migraine is considered as a severe health trouble that impacts the pleasant life. Migraines, which have an effect on youngsters and teens in addition to adults, can developed via 4 stages: prodrome, atmosphere(aura), charge and post-drome. Not everybody who has migraines is going via all stages. The paper tries to focus on the migraine prediction by the use of deep learning model. This paper proposes or provides a Machine Learning technique and model to discover the sort of migraine.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10059738
V. Singh, Amarjeet Singh, A. Aggarwal, S. Aggarwal
DevOps is largely recognized as the one of the most influential development technique for a business, thus many companies have adopted it. The advantages of DevOps are numerous since it successfully enables both the development and operations departments to collaborate in order to reach the organization's objective goal more quickly and efficiently. Continuous Integration and Continuous Development are two major components or procedures in DevOps culture. The success of DevOps in a company is determined by how well workflow operations, such as automation and scaling, are implemented in the production environment. In this work, various advantages of using containerization approach for an advanced version control system are discussed with the help of few experimentations. Various DevOps systems which have been proposed for version manipulate migration are explored. Experimentation has been done with respect to success/error, average duration and API calls breakdown.
{"title":"Advantages of using Containerization Approach for Advanced Version Control System","authors":"V. Singh, Amarjeet Singh, A. Aggarwal, S. Aggarwal","doi":"10.1109/ICERECT56837.2022.10059738","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059738","url":null,"abstract":"DevOps is largely recognized as the one of the most influential development technique for a business, thus many companies have adopted it. The advantages of DevOps are numerous since it successfully enables both the development and operations departments to collaborate in order to reach the organization's objective goal more quickly and efficiently. Continuous Integration and Continuous Development are two major components or procedures in DevOps culture. The success of DevOps in a company is determined by how well workflow operations, such as automation and scaling, are implemented in the production environment. In this work, various advantages of using containerization approach for an advanced version control system are discussed with the help of few experimentations. Various DevOps systems which have been proposed for version manipulate migration are explored. Experimentation has been done with respect to success/error, average duration and API calls breakdown.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060003
Bhoomi Ripal Shah, Y. N
Wireless Sensor Networks (WSN) has been a topic of research since a very long time. The importance of WSN is of huge diversity as it is used in military services, environmental services, medicine, agriculture, etc. WSN is a composition of many sensor nodes that work together to send data from the source to the base station. The sensor nodes are placed systematically inside a network. The design of this network is of most importance as it deals with the reliability, efficiency, energy consumption, delay, and lifetime of the entire WSN. The longest lifespan of the system and lowering sensor node energy consumption are given top priority while developing a WSN. Various types of routing algorithms are used in the perspective of this. In this paper, the author has bifurcated the routing protocols into four main categories which are Multi-hop, Hierarchical, Cluster-based, and Long range. Apart from these, the author has also mentioned routing methods on Fault tolerance, Neutral network, Query based, and Swarm intelligence.
{"title":"Energy-Efficient Routing Protocols for Wireless Sensor Networks","authors":"Bhoomi Ripal Shah, Y. N","doi":"10.1109/ICERECT56837.2022.10060003","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060003","url":null,"abstract":"Wireless Sensor Networks (WSN) has been a topic of research since a very long time. The importance of WSN is of huge diversity as it is used in military services, environmental services, medicine, agriculture, etc. WSN is a composition of many sensor nodes that work together to send data from the source to the base station. The sensor nodes are placed systematically inside a network. The design of this network is of most importance as it deals with the reliability, efficiency, energy consumption, delay, and lifetime of the entire WSN. The longest lifespan of the system and lowering sensor node energy consumption are given top priority while developing a WSN. Various types of routing algorithms are used in the perspective of this. In this paper, the author has bifurcated the routing protocols into four main categories which are Multi-hop, Hierarchical, Cluster-based, and Long range. Apart from these, the author has also mentioned routing methods on Fault tolerance, Neutral network, Query based, and Swarm intelligence.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060853
Anand Joshi, Sachin Jain
The world as we know it today is driven by technology. If servers of tech behemoths like Google, Facebook, and others stop working for a short period of time, the world suffers significant losses, usually measured in the millions. To operate, every business relies on a number of technologies in addition to its hardware and software. Although we live in a technologically advanced world, commercial applications for augmented reality are still relatively rare. Just two examples of businesses that have employed augmented reality to make money from the entertainment sector are Snapchat and Pokémon Go. However, augmented reality hasn't been widely applied in e-commerce or other economic areas. The premise of the provided application is that augmented reality technology is vastly underutilized in the e-commerce industry. As a result, we conduct a thorough literature review of the academic corpus that is centered on AR retail in this study. We discuss the use of augmented reality (AR) in retail, its technological characteristics that are frequently examined, as well as the potential psychological and behavioural effects that augmented reality may have. This essay will discuss how to develop applications, conduct research, and conduct tests.
{"title":"An Approach of Augmented Reality in Field of Furniture Shopping","authors":"Anand Joshi, Sachin Jain","doi":"10.1109/ICERECT56837.2022.10060853","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060853","url":null,"abstract":"The world as we know it today is driven by technology. If servers of tech behemoths like Google, Facebook, and others stop working for a short period of time, the world suffers significant losses, usually measured in the millions. To operate, every business relies on a number of technologies in addition to its hardware and software. Although we live in a technologically advanced world, commercial applications for augmented reality are still relatively rare. Just two examples of businesses that have employed augmented reality to make money from the entertainment sector are Snapchat and Pokémon Go. However, augmented reality hasn't been widely applied in e-commerce or other economic areas. The premise of the provided application is that augmented reality technology is vastly underutilized in the e-commerce industry. As a result, we conduct a thorough literature review of the academic corpus that is centered on AR retail in this study. We discuss the use of augmented reality (AR) in retail, its technological characteristics that are frequently examined, as well as the potential psychological and behavioural effects that augmented reality may have. This essay will discuss how to develop applications, conduct research, and conduct tests.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130471174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060716
Kavita Bhatt, S. M. Kumar
In today's competitive world, sustainability is a key element for any organization. Integrating digital technologies to accelerate process and sustainability aligned to key elements of any organization like - people, process, strategy, technologies, revenues and extension of the organization to accelerate process is called Digital Transformation. Digital Transformation (DX) and its disruptive technologies has its own attached benefits that provides multiple opportunities and possibilities to MSMEs to promote their growth. Industry has moved from mechanized system to virtual world leveraging industry 4.0 practices like AI, machine learning, strong network connection and ensuring effective digital transformation from physical world to virtual world. Digital connectivity defines the pillar for adoption of advance technologies required for industrial revolution. Small and medium sized organization/manufacturing unit has great impact on country's economic growth and indirect impact on large scale companies. Micro, small and medium industries can be moved to digitization by leveraging industry 4.0 practices and maturity model. This paper suggest that fourth industry is growing exponentially in recent past, and it drives a need to derive the structural model technique to model relationship between organization and its sustainability functions. There is little study done on how small-scale companies can scale the digital transformation from conventional model to interconnected and virtual model. Studies are conducted on readiness level of the MSMEs in adopting Industry 4.0 standard. This paper discuss questions like how far the MSMEs are ready for digital transformation. Authors classified the MSMEs into various groups depending on level of Maturity parameter I4.0 measures, using the index aligned to industry 4.0 practices. This study finds out different dimensions suggested for development of industry 4.0 maturity and readiness model which need attention when moving forward for Industry 4.0 and its adoption and corresponding future framework. They are Strategy, Organization, Supply Chain, Manufacturing, Operations, Customers, Product, Services, Business Model, IT, People, Culture to assess an organization's I4.0 maturity and readiness levels.
{"title":"Reindustrialization Using Industry 4.0 Maturity Models in Msmes and Tenets of Digital Transformation Phases","authors":"Kavita Bhatt, S. M. Kumar","doi":"10.1109/ICERECT56837.2022.10060716","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060716","url":null,"abstract":"In today's competitive world, sustainability is a key element for any organization. Integrating digital technologies to accelerate process and sustainability aligned to key elements of any organization like - people, process, strategy, technologies, revenues and extension of the organization to accelerate process is called Digital Transformation. Digital Transformation (DX) and its disruptive technologies has its own attached benefits that provides multiple opportunities and possibilities to MSMEs to promote their growth. Industry has moved from mechanized system to virtual world leveraging industry 4.0 practices like AI, machine learning, strong network connection and ensuring effective digital transformation from physical world to virtual world. Digital connectivity defines the pillar for adoption of advance technologies required for industrial revolution. Small and medium sized organization/manufacturing unit has great impact on country's economic growth and indirect impact on large scale companies. Micro, small and medium industries can be moved to digitization by leveraging industry 4.0 practices and maturity model. This paper suggest that fourth industry is growing exponentially in recent past, and it drives a need to derive the structural model technique to model relationship between organization and its sustainability functions. There is little study done on how small-scale companies can scale the digital transformation from conventional model to interconnected and virtual model. Studies are conducted on readiness level of the MSMEs in adopting Industry 4.0 standard. This paper discuss questions like how far the MSMEs are ready for digital transformation. Authors classified the MSMEs into various groups depending on level of Maturity parameter I4.0 measures, using the index aligned to industry 4.0 practices. This study finds out different dimensions suggested for development of industry 4.0 maturity and readiness model which need attention when moving forward for Industry 4.0 and its adoption and corresponding future framework. They are Strategy, Organization, Supply Chain, Manufacturing, Operations, Customers, Product, Services, Business Model, IT, People, Culture to assess an organization's I4.0 maturity and readiness levels.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10059976
M. Gojiya, K. Badgujar
Sweep frequency response analysis (SFRA) is most conscious to changes in the electrical elements (R, L, C) related to the test setup and test object. Therefore, in order to monitor even the smallest winding movement in a transformer, SFRA testing is a very effective technique. The effect of changes in such electrical elements associated with the test setup (outside the test object) on the FR of the winding should be neglected. Similarly, the FR of the test object is affected by a factor located inside the transformer and unrelated to the test object. It is the transformer winding that is not being tested. All transformer windings are connected together. Even if one of the windings has a mechanical fault, it can interfere with the frequency response of the other healthy windings, even if it is not tested. In this article, experiment results are used to explore this idea.
{"title":"Effect of Transformer Windings (Not Under The Test) on The Frequency Response (FR) of The Winding Under The Test","authors":"M. Gojiya, K. Badgujar","doi":"10.1109/ICERECT56837.2022.10059976","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059976","url":null,"abstract":"Sweep frequency response analysis (SFRA) is most conscious to changes in the electrical elements (R, L, C) related to the test setup and test object. Therefore, in order to monitor even the smallest winding movement in a transformer, SFRA testing is a very effective technique. The effect of changes in such electrical elements associated with the test setup (outside the test object) on the FR of the winding should be neglected. Similarly, the FR of the test object is affected by a factor located inside the transformer and unrelated to the test object. It is the transformer winding that is not being tested. All transformer windings are connected together. Even if one of the windings has a mechanical fault, it can interfere with the frequency response of the other healthy windings, even if it is not tested. In this article, experiment results are used to explore this idea.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10059808
Ramakrishna Gandi, K. D. Charan, K. B. R. Naidu, Kamparapu V V Satya Trinadh Naidu, Y. R. Raju
The present computer era is based in large part on research, processing and safe storage in distributed computer networks of confidential data. In view of the development of various cryptographical algorithms, several research studies have addressed this issue. In addition to the stressful cryptographic studies, it is noted that the protection of data on the server side is vulnerable to handle, and there is need to build and effectively provable security framework that will boost the efficiency of Cloud Server data processing. This paper proposes a new protection scheme which authenticates evidence that sensitive data are stored safely when a cloud-central cloud storage architecture is deployed. This article introduces an innovative computer security mechanism that solves the issue of internal nodes by reducing the overhead computer with powerful security algorithms. The experimental study reveals that the proposed mechanism exceeds most current defense mechanisms.
{"title":"An Hybrid Authentication Mechanism for Cloud Server to Enhance the Computational Efficiency","authors":"Ramakrishna Gandi, K. D. Charan, K. B. R. Naidu, Kamparapu V V Satya Trinadh Naidu, Y. R. Raju","doi":"10.1109/ICERECT56837.2022.10059808","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059808","url":null,"abstract":"The present computer era is based in large part on research, processing and safe storage in distributed computer networks of confidential data. In view of the development of various cryptographical algorithms, several research studies have addressed this issue. In addition to the stressful cryptographic studies, it is noted that the protection of data on the server side is vulnerable to handle, and there is need to build and effectively provable security framework that will boost the efficiency of Cloud Server data processing. This paper proposes a new protection scheme which authenticates evidence that sensitive data are stored safely when a cloud-central cloud storage architecture is deployed. This article introduces an innovative computer security mechanism that solves the issue of internal nodes by reducing the overhead computer with powerful security algorithms. The experimental study reveals that the proposed mechanism exceeds most current defense mechanisms.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}