首页 > 最新文献

2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)最新文献

英文 中文
Safety and Cost Analysis of Electric Vehicle 电动汽车的安全性和成本分析
Suryanarayan Sharma, Upendra Singh Yadav, S. K. Srivastava
This paper examines some of the potential dangers associated with electric vehicles, as well as how European Union and UN type-approval procedures lessen the risks to users. It does so by highlighting any regulatory loopholes as well as the international initiatives now ongoing to remedy them. The main focus of this research paper is on vehicle dangers, with some thought given to how they are likely to be exploited by the general population. Infrastructure-related hazards, such as vehicle charging or battery exchange, are often excluded since they are likely to come under a different regulatory framework.
本文探讨了与电动汽车相关的一些潜在危险,以及欧盟和联合国型式批准程序如何降低用户的风险。它通过强调任何监管漏洞以及目前正在进行的弥补这些漏洞的国际倡议来做到这一点。本研究论文的主要焦点是车辆的危险,与一些思想给予他们是如何可能被利用的一般人群。与基础设施相关的危险,如车辆充电或电池更换,通常被排除在外,因为它们可能属于不同的监管框架。
{"title":"Safety and Cost Analysis of Electric Vehicle","authors":"Suryanarayan Sharma, Upendra Singh Yadav, S. K. Srivastava","doi":"10.1109/ICERECT56837.2022.10060291","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060291","url":null,"abstract":"This paper examines some of the potential dangers associated with electric vehicles, as well as how European Union and UN type-approval procedures lessen the risks to users. It does so by highlighting any regulatory loopholes as well as the international initiatives now ongoing to remedy them. The main focus of this research paper is on vehicle dangers, with some thought given to how they are likely to be exploited by the general population. Infrastructure-related hazards, such as vehicle charging or battery exchange, are often excluded since they are likely to come under a different regulatory framework.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"63 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125998357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modelling of A Speech Enhancement Techniques Using CNN Approach 基于CNN方法的语音增强技术建模
Rupal Gupta, A. Babu
Speech enhancement entails improving speech that has been damaged by noise. Speech enhancement increases a speaker's ability to be understood by human listeners. Recent years have seen a huge increase in interest in deep learning techniques for improving speech, which require both clear and noisy speech for training. However, it can be difficult to get a clear speech signal in realistic situations. Speech enhancement entails improving speech that has been damaged by noise. Speech enhancement increases a speaker's ability to be understood by human listeners. Recent years have seen a huge increase in interest in deep learning techniques for improving speech, which require both clear and noisy speech for training. However, it can be difficult to get a clear speech signal in realistic situations. The testing results address the convenience of the created SE application in uproarious environmental elements and show prominent progressions over the best in class philosophies.
语音增强需要改善因噪音而受损的语音。语音增强可以提高说话者被听众理解的能力。近年来,人们对改善语音的深度学习技术的兴趣大幅增加,这需要清晰和嘈杂的语音进行训练。然而,在现实情况下很难获得清晰的语音信号。语音增强需要改善因噪音而受损的语音。语音增强可以提高说话者被听众理解的能力。近年来,人们对改善语音的深度学习技术的兴趣大幅增加,这需要清晰和嘈杂的语音进行训练。然而,在现实情况下很难获得清晰的语音信号。测试结果解决了在各种环境元素中创建的SE应用程序的便利性,并显示了优于最佳类哲学的显著进步。
{"title":"Modelling of A Speech Enhancement Techniques Using CNN Approach","authors":"Rupal Gupta, A. Babu","doi":"10.1109/ICERECT56837.2022.10060495","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060495","url":null,"abstract":"Speech enhancement entails improving speech that has been damaged by noise. Speech enhancement increases a speaker's ability to be understood by human listeners. Recent years have seen a huge increase in interest in deep learning techniques for improving speech, which require both clear and noisy speech for training. However, it can be difficult to get a clear speech signal in realistic situations. Speech enhancement entails improving speech that has been damaged by noise. Speech enhancement increases a speaker's ability to be understood by human listeners. Recent years have seen a huge increase in interest in deep learning techniques for improving speech, which require both clear and noisy speech for training. However, it can be difficult to get a clear speech signal in realistic situations. The testing results address the convenience of the created SE application in uproarious environmental elements and show prominent progressions over the best in class philosophies.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126711296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encryption-based Malware Detection for Cloud Computing 基于加密的云计算恶意软件检测
Shylaja N S, B. Pandey
In today's scenario Artificial Intelligence (AI), Machine learning, Deep learning, Cloud Computing and the Internet of Things (IoT) are considered to be new methodologies to resolve variations in real-life issues. These methods are significantly used in different industries such as transportation schemes, smart cities, healthcare systems, and agriculture to offer fertile outcomes for lots of problems in today's situation. Cloud computing is an authoritative device to optimize the price in terms of utility, manageability, and hardware for distributing the information, because of the aforementioned features most association convert their services and applications to the cloud. However, some malware ransom ware is difficult to detect without running them. The security information groups endure improving advanced procedures for encryption augmented to cloud facilities. This research focused on malware detection and resolving the security problems in cloud computing by using encryption techniques. The countermeasures for separate susceptibility are based on the investigation outcomes discussed. This comprehensive research supports the researchers in accomplishing a better solution for malware detection on cloud computing)
在当今的场景中,人工智能(AI)、机器学习、深度学习、云计算和物联网(IoT)被认为是解决现实生活中各种问题的新方法。这些方法被广泛应用于不同的行业,如交通计划、智慧城市、医疗保健系统和农业,为当今情况下的许多问题提供了丰富的结果。云计算是一种权威的设备,可以在实用程序、可管理性和用于分发信息的硬件方面优化价格,因为前面提到的特性使大多数协会将其服务和应用程序转换为云。然而,有些勒索软件不运行就很难检测到。安全信息组正在改进用于云设施的高级加密程序。本研究的重点是恶意软件检测,并利用加密技术解决云计算中的安全问题。分别敏感性的对策是根据调查结果讨论的。这项综合研究支持研究人员在云计算上实现更好的恶意软件检测解决方案。
{"title":"Encryption-based Malware Detection for Cloud Computing","authors":"Shylaja N S, B. Pandey","doi":"10.1109/ICERECT56837.2022.10060207","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060207","url":null,"abstract":"In today's scenario Artificial Intelligence (AI), Machine learning, Deep learning, Cloud Computing and the Internet of Things (IoT) are considered to be new methodologies to resolve variations in real-life issues. These methods are significantly used in different industries such as transportation schemes, smart cities, healthcare systems, and agriculture to offer fertile outcomes for lots of problems in today's situation. Cloud computing is an authoritative device to optimize the price in terms of utility, manageability, and hardware for distributing the information, because of the aforementioned features most association convert their services and applications to the cloud. However, some malware ransom ware is difficult to detect without running them. The security information groups endure improving advanced procedures for encryption augmented to cloud facilities. This research focused on malware detection and resolving the security problems in cloud computing by using encryption techniques. The countermeasures for separate susceptibility are based on the investigation outcomes discussed. This comprehensive research supports the researchers in accomplishing a better solution for malware detection on cloud computing)","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Migraine Prediction Using Deep Learning Model 使用深度学习模型预测偏头痛
Anjana Jalannavar, Suvarna G. Kanakaraddi, Vidya S. Handur
A migraine is a headache which could reason very terrible palpitate ache, commonly on one part of the head. Symptoms of migraine are nausea, vomiting, and intense sensitivity to brightness and sound. Migraine attacks that may cause for hours to days, and the ache may be so intense that it interferes with each day ventures. Migraine and episodic headache are one of the most common kinds of primary headache. Migraine is considered as a severe health trouble that impacts the pleasant life. Migraines, which have an effect on youngsters and teens in addition to adults, can developed via 4 stages: prodrome, atmosphere(aura), charge and post-drome. Not everybody who has migraines is going via all stages. The paper tries to focus on the migraine prediction by the use of deep learning model. This paper proposes or provides a Machine Learning technique and model to discover the sort of migraine.
偏头痛是一种头痛,可以引起非常可怕的心悸疼痛,通常在头部的一部分。偏头痛的症状是恶心、呕吐、对光线和声音极度敏感。偏头痛发作可能持续数小时到数天,疼痛可能如此强烈,以至于干扰了每天的活动。偏头痛和阵发性头痛是最常见的原发性头痛之一。偏头痛被认为是一种严重的健康问题,影响着人们的愉快生活。偏头痛不仅对成年人也有影响,对青少年和青少年也有影响。偏头痛的发展可分为4个阶段:前驱、先兆、发作期和后驱期。并不是每个偏头痛患者都经历了所有阶段。本文试图利用深度学习模型对偏头痛进行预测。本文提出或提供了一种机器学习技术和模型来发现偏头痛的类型。
{"title":"Migraine Prediction Using Deep Learning Model","authors":"Anjana Jalannavar, Suvarna G. Kanakaraddi, Vidya S. Handur","doi":"10.1109/ICERECT56837.2022.10059843","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059843","url":null,"abstract":"A migraine is a headache which could reason very terrible palpitate ache, commonly on one part of the head. Symptoms of migraine are nausea, vomiting, and intense sensitivity to brightness and sound. Migraine attacks that may cause for hours to days, and the ache may be so intense that it interferes with each day ventures. Migraine and episodic headache are one of the most common kinds of primary headache. Migraine is considered as a severe health trouble that impacts the pleasant life. Migraines, which have an effect on youngsters and teens in addition to adults, can developed via 4 stages: prodrome, atmosphere(aura), charge and post-drome. Not everybody who has migraines is going via all stages. The paper tries to focus on the migraine prediction by the use of deep learning model. This paper proposes or provides a Machine Learning technique and model to discover the sort of migraine.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advantages of using Containerization Approach for Advanced Version Control System 在高级版本控制系统中采用容器化方法的优点
V. Singh, Amarjeet Singh, A. Aggarwal, S. Aggarwal
DevOps is largely recognized as the one of the most influential development technique for a business, thus many companies have adopted it. The advantages of DevOps are numerous since it successfully enables both the development and operations departments to collaborate in order to reach the organization's objective goal more quickly and efficiently. Continuous Integration and Continuous Development are two major components or procedures in DevOps culture. The success of DevOps in a company is determined by how well workflow operations, such as automation and scaling, are implemented in the production environment. In this work, various advantages of using containerization approach for an advanced version control system are discussed with the help of few experimentations. Various DevOps systems which have been proposed for version manipulate migration are explored. Experimentation has been done with respect to success/error, average duration and API calls breakdown.
DevOps在很大程度上被认为是对业务最有影响力的开发技术之一,因此许多公司都采用了它。DevOps的优点很多,因为它成功地使开发和运营部门能够协作,以便更快、更有效地达到组织的目标。持续集成和持续开发是DevOps文化中的两个主要组成部分或过程。公司中DevOps的成功取决于工作流操作(如自动化和扩展)在生产环境中的实现程度。本文通过少量的实验,讨论了在高级版本控制系统中使用容器化方法的各种优点。本文探讨了各种用于版本操作迁移的DevOps系统。关于成功/错误、平均持续时间和API调用崩溃进行了实验。
{"title":"Advantages of using Containerization Approach for Advanced Version Control System","authors":"V. Singh, Amarjeet Singh, A. Aggarwal, S. Aggarwal","doi":"10.1109/ICERECT56837.2022.10059738","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059738","url":null,"abstract":"DevOps is largely recognized as the one of the most influential development technique for a business, thus many companies have adopted it. The advantages of DevOps are numerous since it successfully enables both the development and operations departments to collaborate in order to reach the organization's objective goal more quickly and efficiently. Continuous Integration and Continuous Development are two major components or procedures in DevOps culture. The success of DevOps in a company is determined by how well workflow operations, such as automation and scaling, are implemented in the production environment. In this work, various advantages of using containerization approach for an advanced version control system are discussed with the help of few experimentations. Various DevOps systems which have been proposed for version manipulate migration are explored. Experimentation has been done with respect to success/error, average duration and API calls breakdown.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-Efficient Routing Protocols for Wireless Sensor Networks 无线传感器网络的节能路由协议
Bhoomi Ripal Shah, Y. N
Wireless Sensor Networks (WSN) has been a topic of research since a very long time. The importance of WSN is of huge diversity as it is used in military services, environmental services, medicine, agriculture, etc. WSN is a composition of many sensor nodes that work together to send data from the source to the base station. The sensor nodes are placed systematically inside a network. The design of this network is of most importance as it deals with the reliability, efficiency, energy consumption, delay, and lifetime of the entire WSN. The longest lifespan of the system and lowering sensor node energy consumption are given top priority while developing a WSN. Various types of routing algorithms are used in the perspective of this. In this paper, the author has bifurcated the routing protocols into four main categories which are Multi-hop, Hierarchical, Cluster-based, and Long range. Apart from these, the author has also mentioned routing methods on Fault tolerance, Neutral network, Query based, and Swarm intelligence.
无线传感器网络(WSN)长期以来一直是一个研究课题。无线传感器网络在军事服务、环境服务、医学、农业等领域的应用具有巨大的多样性。WSN是由许多传感器节点组成的,这些节点共同工作,将数据从源发送到基站。传感器节点被系统地放置在一个网络中。该网络的设计关系到整个无线传感器网络的可靠性、效率、能耗、时延和寿命等问题。在开发WSN时,系统的最长寿命和降低传感器节点的能耗是重中之重。各种类型的路由算法在这个角度被使用。在本文中,作者将路由协议分为多跳、分层、基于集群和远程四大类。除此之外,作者还提到了基于容错、中立网络、基于查询和群体智能的路由方法。
{"title":"Energy-Efficient Routing Protocols for Wireless Sensor Networks","authors":"Bhoomi Ripal Shah, Y. N","doi":"10.1109/ICERECT56837.2022.10060003","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060003","url":null,"abstract":"Wireless Sensor Networks (WSN) has been a topic of research since a very long time. The importance of WSN is of huge diversity as it is used in military services, environmental services, medicine, agriculture, etc. WSN is a composition of many sensor nodes that work together to send data from the source to the base station. The sensor nodes are placed systematically inside a network. The design of this network is of most importance as it deals with the reliability, efficiency, energy consumption, delay, and lifetime of the entire WSN. The longest lifespan of the system and lowering sensor node energy consumption are given top priority while developing a WSN. Various types of routing algorithms are used in the perspective of this. In this paper, the author has bifurcated the routing protocols into four main categories which are Multi-hop, Hierarchical, Cluster-based, and Long range. Apart from these, the author has also mentioned routing methods on Fault tolerance, Neutral network, Query based, and Swarm intelligence.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach of Augmented Reality in Field of Furniture Shopping 家具购物领域的增强现实方法
Anand Joshi, Sachin Jain
The world as we know it today is driven by technology. If servers of tech behemoths like Google, Facebook, and others stop working for a short period of time, the world suffers significant losses, usually measured in the millions. To operate, every business relies on a number of technologies in addition to its hardware and software. Although we live in a technologically advanced world, commercial applications for augmented reality are still relatively rare. Just two examples of businesses that have employed augmented reality to make money from the entertainment sector are Snapchat and Pokémon Go. However, augmented reality hasn't been widely applied in e-commerce or other economic areas. The premise of the provided application is that augmented reality technology is vastly underutilized in the e-commerce industry. As a result, we conduct a thorough literature review of the academic corpus that is centered on AR retail in this study. We discuss the use of augmented reality (AR) in retail, its technological characteristics that are frequently examined, as well as the potential psychological and behavioural effects that augmented reality may have. This essay will discuss how to develop applications, conduct research, and conduct tests.
我们所熟知的当今世界是由技术驱动的。如果谷歌、Facebook 等科技巨头的服务器在短时间内停止工作,世界将遭受重大损失,损失通常以百万计。除了硬件和软件之外,每家企业的运营还依赖于多项技术。虽然我们生活在一个技术先进的世界,但增强现实技术的商业应用仍然相对罕见。Snapchat和Pokémon Go就是利用增强现实技术从娱乐领域赚钱的两个例子。不过,增强现实技术还没有广泛应用于电子商务或其他经济领域。所提供应用的前提是,增强现实技术在电子商务行业的利用率远远不够。因此,我们在本研究中对以增强现实零售技术为中心的学术语料库进行了全面的文献综述。我们将讨论增强现实技术(AR)在零售业中的应用、其经常被研究的技术特点,以及增强现实技术可能产生的潜在心理和行为影响。本文将讨论如何开发应用、开展研究和进行测试。
{"title":"An Approach of Augmented Reality in Field of Furniture Shopping","authors":"Anand Joshi, Sachin Jain","doi":"10.1109/ICERECT56837.2022.10060853","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060853","url":null,"abstract":"The world as we know it today is driven by technology. If servers of tech behemoths like Google, Facebook, and others stop working for a short period of time, the world suffers significant losses, usually measured in the millions. To operate, every business relies on a number of technologies in addition to its hardware and software. Although we live in a technologically advanced world, commercial applications for augmented reality are still relatively rare. Just two examples of businesses that have employed augmented reality to make money from the entertainment sector are Snapchat and Pokémon Go. However, augmented reality hasn't been widely applied in e-commerce or other economic areas. The premise of the provided application is that augmented reality technology is vastly underutilized in the e-commerce industry. As a result, we conduct a thorough literature review of the academic corpus that is centered on AR retail in this study. We discuss the use of augmented reality (AR) in retail, its technological characteristics that are frequently examined, as well as the potential psychological and behavioural effects that augmented reality may have. This essay will discuss how to develop applications, conduct research, and conduct tests.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130471174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reindustrialization Using Industry 4.0 Maturity Models in Msmes and Tenets of Digital Transformation Phases 基于工业4.0成熟度模型的中小微企业再工业化及数字化转型阶段原则
Kavita Bhatt, S. M. Kumar
In today's competitive world, sustainability is a key element for any organization. Integrating digital technologies to accelerate process and sustainability aligned to key elements of any organization like - people, process, strategy, technologies, revenues and extension of the organization to accelerate process is called Digital Transformation. Digital Transformation (DX) and its disruptive technologies has its own attached benefits that provides multiple opportunities and possibilities to MSMEs to promote their growth. Industry has moved from mechanized system to virtual world leveraging industry 4.0 practices like AI, machine learning, strong network connection and ensuring effective digital transformation from physical world to virtual world. Digital connectivity defines the pillar for adoption of advance technologies required for industrial revolution. Small and medium sized organization/manufacturing unit has great impact on country's economic growth and indirect impact on large scale companies. Micro, small and medium industries can be moved to digitization by leveraging industry 4.0 practices and maturity model. This paper suggest that fourth industry is growing exponentially in recent past, and it drives a need to derive the structural model technique to model relationship between organization and its sustainability functions. There is little study done on how small-scale companies can scale the digital transformation from conventional model to interconnected and virtual model. Studies are conducted on readiness level of the MSMEs in adopting Industry 4.0 standard. This paper discuss questions like how far the MSMEs are ready for digital transformation. Authors classified the MSMEs into various groups depending on level of Maturity parameter I4.0 measures, using the index aligned to industry 4.0 practices. This study finds out different dimensions suggested for development of industry 4.0 maturity and readiness model which need attention when moving forward for Industry 4.0 and its adoption and corresponding future framework. They are Strategy, Organization, Supply Chain, Manufacturing, Operations, Customers, Product, Services, Business Model, IT, People, Culture to assess an organization's I4.0 maturity and readiness levels.
在当今竞争激烈的世界中,可持续性是任何组织的关键要素。整合数字技术来加速流程和可持续性,与任何组织的关键要素(如人员、流程、战略、技术、收入和组织的扩展)保持一致,以加速流程,这被称为数字化转型。数字化转型及其颠覆性技术具有自身的附加效益,为中小微企业提供了促进其发展的多种机会和可能性。利用人工智能、机器学习、强大的网络连接等工业4.0实践,确保从物理世界到虚拟世界的有效数字化转型,工业已经从机械化系统转向虚拟世界。数字连接是采用工业革命所需的先进技术的支柱。中小型组织/制造单位对国家经济增长有很大的影响,对大型企业也有间接的影响。通过利用工业4.0实践和成熟度模型,可以将中小微行业转移到数字化。本文认为,近年来第四产业呈指数级增长,因此有必要推导结构模型技术来模拟组织与其可持续性功能之间的关系。关于小型企业如何从传统模式向互联虚拟模式进行数字化转型的研究很少。对中小微企业采用工业4.0标准的准备程度进行研究。本文讨论了中小微企业为数字化转型做好了多大准备等问题。作者使用与工业4.0实践相一致的指数,根据成熟度参数I4.0度量的水平将中小微企业分为不同的组。本研究发现了工业4.0成熟度和准备度模型发展的不同维度,以及工业4.0的采用和相应的未来框架需要注意的问题。它们是战略、组织、供应链、制造、运营、客户、产品、服务、业务模型、IT、人员、文化,以评估组织的工业4.0成熟度和准备水平。
{"title":"Reindustrialization Using Industry 4.0 Maturity Models in Msmes and Tenets of Digital Transformation Phases","authors":"Kavita Bhatt, S. M. Kumar","doi":"10.1109/ICERECT56837.2022.10060716","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060716","url":null,"abstract":"In today's competitive world, sustainability is a key element for any organization. Integrating digital technologies to accelerate process and sustainability aligned to key elements of any organization like - people, process, strategy, technologies, revenues and extension of the organization to accelerate process is called Digital Transformation. Digital Transformation (DX) and its disruptive technologies has its own attached benefits that provides multiple opportunities and possibilities to MSMEs to promote their growth. Industry has moved from mechanized system to virtual world leveraging industry 4.0 practices like AI, machine learning, strong network connection and ensuring effective digital transformation from physical world to virtual world. Digital connectivity defines the pillar for adoption of advance technologies required for industrial revolution. Small and medium sized organization/manufacturing unit has great impact on country's economic growth and indirect impact on large scale companies. Micro, small and medium industries can be moved to digitization by leveraging industry 4.0 practices and maturity model. This paper suggest that fourth industry is growing exponentially in recent past, and it drives a need to derive the structural model technique to model relationship between organization and its sustainability functions. There is little study done on how small-scale companies can scale the digital transformation from conventional model to interconnected and virtual model. Studies are conducted on readiness level of the MSMEs in adopting Industry 4.0 standard. This paper discuss questions like how far the MSMEs are ready for digital transformation. Authors classified the MSMEs into various groups depending on level of Maturity parameter I4.0 measures, using the index aligned to industry 4.0 practices. This study finds out different dimensions suggested for development of industry 4.0 maturity and readiness model which need attention when moving forward for Industry 4.0 and its adoption and corresponding future framework. They are Strategy, Organization, Supply Chain, Manufacturing, Operations, Customers, Product, Services, Business Model, IT, People, Culture to assess an organization's I4.0 maturity and readiness levels.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of Transformer Windings (Not Under The Test) on The Frequency Response (FR) of The Winding Under The Test 变压器绕组(非测试)对测试绕组频率响应(FR)的影响
M. Gojiya, K. Badgujar
Sweep frequency response analysis (SFRA) is most conscious to changes in the electrical elements (R, L, C) related to the test setup and test object. Therefore, in order to monitor even the smallest winding movement in a transformer, SFRA testing is a very effective technique. The effect of changes in such electrical elements associated with the test setup (outside the test object) on the FR of the winding should be neglected. Similarly, the FR of the test object is affected by a factor located inside the transformer and unrelated to the test object. It is the transformer winding that is not being tested. All transformer windings are connected together. Even if one of the windings has a mechanical fault, it can interfere with the frequency response of the other healthy windings, even if it is not tested. In this article, experiment results are used to explore this idea.
扫描频响分析(SFRA)最关注与测试装置和测试对象相关的电气元件(R、L、C)的变化。因此,为了监测变压器中最小的绕组运动,SFRA测试是一种非常有效的技术。与测试装置(在测试对象之外)相关的这些电气元件的变化对绕组FR的影响应被忽略。类似地,测试对象的FR受到位于变压器内部且与测试对象无关的因素的影响。没有测试的是变压器绕组。所有的变压器绕组都连接在一起。即使其中一个绕组有机械故障,它也会干扰其他健康绕组的频率响应,即使它没有经过测试。本文用实验结果对这一思路进行了探讨。
{"title":"Effect of Transformer Windings (Not Under The Test) on The Frequency Response (FR) of The Winding Under The Test","authors":"M. Gojiya, K. Badgujar","doi":"10.1109/ICERECT56837.2022.10059976","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059976","url":null,"abstract":"Sweep frequency response analysis (SFRA) is most conscious to changes in the electrical elements (R, L, C) related to the test setup and test object. Therefore, in order to monitor even the smallest winding movement in a transformer, SFRA testing is a very effective technique. The effect of changes in such electrical elements associated with the test setup (outside the test object) on the FR of the winding should be neglected. Similarly, the FR of the test object is affected by a factor located inside the transformer and unrelated to the test object. It is the transformer winding that is not being tested. All transformer windings are connected together. Even if one of the windings has a mechanical fault, it can interfere with the frequency response of the other healthy windings, even if it is not tested. In this article, experiment results are used to explore this idea.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Hybrid Authentication Mechanism for Cloud Server to Enhance the Computational Efficiency 一种提高计算效率的云服务器混合认证机制
Ramakrishna Gandi, K. D. Charan, K. B. R. Naidu, Kamparapu V V Satya Trinadh Naidu, Y. R. Raju
The present computer era is based in large part on research, processing and safe storage in distributed computer networks of confidential data. In view of the development of various cryptographical algorithms, several research studies have addressed this issue. In addition to the stressful cryptographic studies, it is noted that the protection of data on the server side is vulnerable to handle, and there is need to build and effectively provable security framework that will boost the efficiency of Cloud Server data processing. This paper proposes a new protection scheme which authenticates evidence that sensitive data are stored safely when a cloud-central cloud storage architecture is deployed. This article introduces an innovative computer security mechanism that solves the issue of internal nodes by reducing the overhead computer with powerful security algorithms. The experimental study reveals that the proposed mechanism exceeds most current defense mechanisms.
当前的计算机时代在很大程度上是基于机密数据在分布式计算机网络中的研究、处理和安全存储。鉴于各种加密算法的发展,一些研究已经解决了这个问题。除了有压力的密码学研究外,还注意到服务器端数据的保护容易处理,需要建立有效可证明的安全框架,以提高云服务器数据处理的效率。本文提出了一种新的保护方案,用于在云中心云存储架构下对敏感数据安全存储的证据进行认证。本文介绍了一种创新的计算机安全机制,通过强大的安全算法减少计算机的开销,解决了内部节点的问题。实验研究表明,该机制优于目前大多数防御机制。
{"title":"An Hybrid Authentication Mechanism for Cloud Server to Enhance the Computational Efficiency","authors":"Ramakrishna Gandi, K. D. Charan, K. B. R. Naidu, Kamparapu V V Satya Trinadh Naidu, Y. R. Raju","doi":"10.1109/ICERECT56837.2022.10059808","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059808","url":null,"abstract":"The present computer era is based in large part on research, processing and safe storage in distributed computer networks of confidential data. In view of the development of various cryptographical algorithms, several research studies have addressed this issue. In addition to the stressful cryptographic studies, it is noted that the protection of data on the server side is vulnerable to handle, and there is need to build and effectively provable security framework that will boost the efficiency of Cloud Server data processing. This paper proposes a new protection scheme which authenticates evidence that sensitive data are stored safely when a cloud-central cloud storage architecture is deployed. This article introduces an innovative computer security mechanism that solves the issue of internal nodes by reducing the overhead computer with powerful security algorithms. The experimental study reveals that the proposed mechanism exceeds most current defense mechanisms.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1