Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10059976
M. Gojiya, K. Badgujar
Sweep frequency response analysis (SFRA) is most conscious to changes in the electrical elements (R, L, C) related to the test setup and test object. Therefore, in order to monitor even the smallest winding movement in a transformer, SFRA testing is a very effective technique. The effect of changes in such electrical elements associated with the test setup (outside the test object) on the FR of the winding should be neglected. Similarly, the FR of the test object is affected by a factor located inside the transformer and unrelated to the test object. It is the transformer winding that is not being tested. All transformer windings are connected together. Even if one of the windings has a mechanical fault, it can interfere with the frequency response of the other healthy windings, even if it is not tested. In this article, experiment results are used to explore this idea.
{"title":"Effect of Transformer Windings (Not Under The Test) on The Frequency Response (FR) of The Winding Under The Test","authors":"M. Gojiya, K. Badgujar","doi":"10.1109/ICERECT56837.2022.10059976","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059976","url":null,"abstract":"Sweep frequency response analysis (SFRA) is most conscious to changes in the electrical elements (R, L, C) related to the test setup and test object. Therefore, in order to monitor even the smallest winding movement in a transformer, SFRA testing is a very effective technique. The effect of changes in such electrical elements associated with the test setup (outside the test object) on the FR of the winding should be neglected. Similarly, the FR of the test object is affected by a factor located inside the transformer and unrelated to the test object. It is the transformer winding that is not being tested. All transformer windings are connected together. Even if one of the windings has a mechanical fault, it can interfere with the frequency response of the other healthy windings, even if it is not tested. In this article, experiment results are used to explore this idea.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10059808
Ramakrishna Gandi, K. D. Charan, K. B. R. Naidu, Kamparapu V V Satya Trinadh Naidu, Y. R. Raju
The present computer era is based in large part on research, processing and safe storage in distributed computer networks of confidential data. In view of the development of various cryptographical algorithms, several research studies have addressed this issue. In addition to the stressful cryptographic studies, it is noted that the protection of data on the server side is vulnerable to handle, and there is need to build and effectively provable security framework that will boost the efficiency of Cloud Server data processing. This paper proposes a new protection scheme which authenticates evidence that sensitive data are stored safely when a cloud-central cloud storage architecture is deployed. This article introduces an innovative computer security mechanism that solves the issue of internal nodes by reducing the overhead computer with powerful security algorithms. The experimental study reveals that the proposed mechanism exceeds most current defense mechanisms.
{"title":"An Hybrid Authentication Mechanism for Cloud Server to Enhance the Computational Efficiency","authors":"Ramakrishna Gandi, K. D. Charan, K. B. R. Naidu, Kamparapu V V Satya Trinadh Naidu, Y. R. Raju","doi":"10.1109/ICERECT56837.2022.10059808","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059808","url":null,"abstract":"The present computer era is based in large part on research, processing and safe storage in distributed computer networks of confidential data. In view of the development of various cryptographical algorithms, several research studies have addressed this issue. In addition to the stressful cryptographic studies, it is noted that the protection of data on the server side is vulnerable to handle, and there is need to build and effectively provable security framework that will boost the efficiency of Cloud Server data processing. This paper proposes a new protection scheme which authenticates evidence that sensitive data are stored safely when a cloud-central cloud storage architecture is deployed. This article introduces an innovative computer security mechanism that solves the issue of internal nodes by reducing the overhead computer with powerful security algorithms. The experimental study reveals that the proposed mechanism exceeds most current defense mechanisms.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10059738
V. Singh, Amarjeet Singh, A. Aggarwal, S. Aggarwal
DevOps is largely recognized as the one of the most influential development technique for a business, thus many companies have adopted it. The advantages of DevOps are numerous since it successfully enables both the development and operations departments to collaborate in order to reach the organization's objective goal more quickly and efficiently. Continuous Integration and Continuous Development are two major components or procedures in DevOps culture. The success of DevOps in a company is determined by how well workflow operations, such as automation and scaling, are implemented in the production environment. In this work, various advantages of using containerization approach for an advanced version control system are discussed with the help of few experimentations. Various DevOps systems which have been proposed for version manipulate migration are explored. Experimentation has been done with respect to success/error, average duration and API calls breakdown.
{"title":"Advantages of using Containerization Approach for Advanced Version Control System","authors":"V. Singh, Amarjeet Singh, A. Aggarwal, S. Aggarwal","doi":"10.1109/ICERECT56837.2022.10059738","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059738","url":null,"abstract":"DevOps is largely recognized as the one of the most influential development technique for a business, thus many companies have adopted it. The advantages of DevOps are numerous since it successfully enables both the development and operations departments to collaborate in order to reach the organization's objective goal more quickly and efficiently. Continuous Integration and Continuous Development are two major components or procedures in DevOps culture. The success of DevOps in a company is determined by how well workflow operations, such as automation and scaling, are implemented in the production environment. In this work, various advantages of using containerization approach for an advanced version control system are discussed with the help of few experimentations. Various DevOps systems which have been proposed for version manipulate migration are explored. Experimentation has been done with respect to success/error, average duration and API calls breakdown.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060012
Yifeng Li, Li-Hui Zhang, Zhao Jin, Songyang Liu, X. Geng, Yi Wang, Bao-hui Li, Ming-Hsuan Yang, Yan Xu, Xiao-yang Wei, Haixia Wang, Ke Jiang, Hong Wang, Jinghui Yang, Xiaoxue Zhang
The seat of human centrifuge is an important content of cabin design, which includes the physical performance parameters such as structural size, stiffness, strength and interface requirements and others, and the medical performance parameters such as adjusting stroke, chair back angle and chair surface angle and others. Firstly, this paper explains the necessity of improving the existing seat on human centrifuge, and then introduces the structure of the seat, and makes a comparison for the structure before and after improvement. In this paper, the physical performance parameters of the when improving the seat are mainly discussed, and the design of each parameter is explained. The research results can be used as an important reference basis for the similar design on seat in cockpit and aircraft.
{"title":"Research on Physical Performances of the Improved Seat on Human Centrifuge","authors":"Yifeng Li, Li-Hui Zhang, Zhao Jin, Songyang Liu, X. Geng, Yi Wang, Bao-hui Li, Ming-Hsuan Yang, Yan Xu, Xiao-yang Wei, Haixia Wang, Ke Jiang, Hong Wang, Jinghui Yang, Xiaoxue Zhang","doi":"10.1109/ICERECT56837.2022.10060012","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060012","url":null,"abstract":"The seat of human centrifuge is an important content of cabin design, which includes the physical performance parameters such as structural size, stiffness, strength and interface requirements and others, and the medical performance parameters such as adjusting stroke, chair back angle and chair surface angle and others. Firstly, this paper explains the necessity of improving the existing seat on human centrifuge, and then introduces the structure of the seat, and makes a comparison for the structure before and after improvement. In this paper, the physical performance parameters of the when improving the seat are mainly discussed, and the design of each parameter is explained. The research results can be used as an important reference basis for the similar design on seat in cockpit and aircraft.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129728165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060000
Tao Huang, Qingqing Cheng, Jinghua Meng
With the rapid development of computer technology, artificial intelligence algorithms have been widely used. Under the background of global low carbon development consensus, construction industry electrification has also become one of the future development trends. Its technical means include not only promoting the substitution and electrification of building electricity, but also promoting the development of building power distribution system to improve its flexibility, safety, reliability and efficiency. Adapt to the high proportion of renewable energy and different demands for energy services in the future. In addition, the building distribution network is no longer a simple user, but is introduced into the urban power grid to provide network support and support services directly beneficial to the power grid. Artificial intelligence is a branch of computer science. Artificial intelligence is of great significance not only in the field of computer, but also in the fields of robots, control systems and simulation systems. The application of artificial intelligence, including computer science, psychology, philosophy, linguistics and other disciplines, plays a very important role in the development of electrification. In the development process of electrification, it involves special contents in machine vision, robot and other related fields, so it is particularly important to introduce artificial intelligence algorithms.
{"title":"Research on Optimization of Indoor Optical Storage Technology Based on Artificial Intelligence Algorithm","authors":"Tao Huang, Qingqing Cheng, Jinghua Meng","doi":"10.1109/ICERECT56837.2022.10060000","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060000","url":null,"abstract":"With the rapid development of computer technology, artificial intelligence algorithms have been widely used. Under the background of global low carbon development consensus, construction industry electrification has also become one of the future development trends. Its technical means include not only promoting the substitution and electrification of building electricity, but also promoting the development of building power distribution system to improve its flexibility, safety, reliability and efficiency. Adapt to the high proportion of renewable energy and different demands for energy services in the future. In addition, the building distribution network is no longer a simple user, but is introduced into the urban power grid to provide network support and support services directly beneficial to the power grid. Artificial intelligence is a branch of computer science. Artificial intelligence is of great significance not only in the field of computer, but also in the fields of robots, control systems and simulation systems. The application of artificial intelligence, including computer science, psychology, philosophy, linguistics and other disciplines, plays a very important role in the development of electrification. In the development process of electrification, it involves special contents in machine vision, robot and other related fields, so it is particularly important to introduce artificial intelligence algorithms.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129749248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060853
Anand Joshi, Sachin Jain
The world as we know it today is driven by technology. If servers of tech behemoths like Google, Facebook, and others stop working for a short period of time, the world suffers significant losses, usually measured in the millions. To operate, every business relies on a number of technologies in addition to its hardware and software. Although we live in a technologically advanced world, commercial applications for augmented reality are still relatively rare. Just two examples of businesses that have employed augmented reality to make money from the entertainment sector are Snapchat and Pokémon Go. However, augmented reality hasn't been widely applied in e-commerce or other economic areas. The premise of the provided application is that augmented reality technology is vastly underutilized in the e-commerce industry. As a result, we conduct a thorough literature review of the academic corpus that is centered on AR retail in this study. We discuss the use of augmented reality (AR) in retail, its technological characteristics that are frequently examined, as well as the potential psychological and behavioural effects that augmented reality may have. This essay will discuss how to develop applications, conduct research, and conduct tests.
{"title":"An Approach of Augmented Reality in Field of Furniture Shopping","authors":"Anand Joshi, Sachin Jain","doi":"10.1109/ICERECT56837.2022.10060853","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060853","url":null,"abstract":"The world as we know it today is driven by technology. If servers of tech behemoths like Google, Facebook, and others stop working for a short period of time, the world suffers significant losses, usually measured in the millions. To operate, every business relies on a number of technologies in addition to its hardware and software. Although we live in a technologically advanced world, commercial applications for augmented reality are still relatively rare. Just two examples of businesses that have employed augmented reality to make money from the entertainment sector are Snapchat and Pokémon Go. However, augmented reality hasn't been widely applied in e-commerce or other economic areas. The premise of the provided application is that augmented reality technology is vastly underutilized in the e-commerce industry. As a result, we conduct a thorough literature review of the academic corpus that is centered on AR retail in this study. We discuss the use of augmented reality (AR) in retail, its technological characteristics that are frequently examined, as well as the potential psychological and behavioural effects that augmented reality may have. This essay will discuss how to develop applications, conduct research, and conduct tests.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130471174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060137
A. S, S. Kulkarni, Sandeep Gupta, P. V.
The State of Charge (SoC) is important in determining the remaining capacity of the battery pack, whereas the State of Health (SoH) indicates the battery's health. These two quantities are computed using Coulomb-counting algorithms and the measured voltage, current, and temperature. The battery's fault status is also monitored. If the temperature or current rise above their respective threshold values, the BMS ensures that the load is disconnected from the power supply. As a result, the battery is always operating within the Safe Operating Envelope (SOE). Proteus Software is used for the software simulation, and Arduino, sensors, and a Lithium-ion battery are used for the hardware model.
{"title":"Battery Management System (BMS) for Electric Vehicle Applications","authors":"A. S, S. Kulkarni, Sandeep Gupta, P. V.","doi":"10.1109/ICERECT56837.2022.10060137","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060137","url":null,"abstract":"The State of Charge (SoC) is important in determining the remaining capacity of the battery pack, whereas the State of Health (SoH) indicates the battery's health. These two quantities are computed using Coulomb-counting algorithms and the measured voltage, current, and temperature. The battery's fault status is also monitored. If the temperature or current rise above their respective threshold values, the BMS ensures that the load is disconnected from the power supply. As a result, the battery is always operating within the Safe Operating Envelope (SOE). Proteus Software is used for the software simulation, and Arduino, sensors, and a Lithium-ion battery are used for the hardware model.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130596111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10059843
Anjana Jalannavar, Suvarna G. Kanakaraddi, Vidya S. Handur
A migraine is a headache which could reason very terrible palpitate ache, commonly on one part of the head. Symptoms of migraine are nausea, vomiting, and intense sensitivity to brightness and sound. Migraine attacks that may cause for hours to days, and the ache may be so intense that it interferes with each day ventures. Migraine and episodic headache are one of the most common kinds of primary headache. Migraine is considered as a severe health trouble that impacts the pleasant life. Migraines, which have an effect on youngsters and teens in addition to adults, can developed via 4 stages: prodrome, atmosphere(aura), charge and post-drome. Not everybody who has migraines is going via all stages. The paper tries to focus on the migraine prediction by the use of deep learning model. This paper proposes or provides a Machine Learning technique and model to discover the sort of migraine.
{"title":"Migraine Prediction Using Deep Learning Model","authors":"Anjana Jalannavar, Suvarna G. Kanakaraddi, Vidya S. Handur","doi":"10.1109/ICERECT56837.2022.10059843","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059843","url":null,"abstract":"A migraine is a headache which could reason very terrible palpitate ache, commonly on one part of the head. Symptoms of migraine are nausea, vomiting, and intense sensitivity to brightness and sound. Migraine attacks that may cause for hours to days, and the ache may be so intense that it interferes with each day ventures. Migraine and episodic headache are one of the most common kinds of primary headache. Migraine is considered as a severe health trouble that impacts the pleasant life. Migraines, which have an effect on youngsters and teens in addition to adults, can developed via 4 stages: prodrome, atmosphere(aura), charge and post-drome. Not everybody who has migraines is going via all stages. The paper tries to focus on the migraine prediction by the use of deep learning model. This paper proposes or provides a Machine Learning technique and model to discover the sort of migraine.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060207
Shylaja N S, B. Pandey
In today's scenario Artificial Intelligence (AI), Machine learning, Deep learning, Cloud Computing and the Internet of Things (IoT) are considered to be new methodologies to resolve variations in real-life issues. These methods are significantly used in different industries such as transportation schemes, smart cities, healthcare systems, and agriculture to offer fertile outcomes for lots of problems in today's situation. Cloud computing is an authoritative device to optimize the price in terms of utility, manageability, and hardware for distributing the information, because of the aforementioned features most association convert their services and applications to the cloud. However, some malware ransom ware is difficult to detect without running them. The security information groups endure improving advanced procedures for encryption augmented to cloud facilities. This research focused on malware detection and resolving the security problems in cloud computing by using encryption techniques. The countermeasures for separate susceptibility are based on the investigation outcomes discussed. This comprehensive research supports the researchers in accomplishing a better solution for malware detection on cloud computing)
{"title":"Encryption-based Malware Detection for Cloud Computing","authors":"Shylaja N S, B. Pandey","doi":"10.1109/ICERECT56837.2022.10060207","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060207","url":null,"abstract":"In today's scenario Artificial Intelligence (AI), Machine learning, Deep learning, Cloud Computing and the Internet of Things (IoT) are considered to be new methodologies to resolve variations in real-life issues. These methods are significantly used in different industries such as transportation schemes, smart cities, healthcare systems, and agriculture to offer fertile outcomes for lots of problems in today's situation. Cloud computing is an authoritative device to optimize the price in terms of utility, manageability, and hardware for distributing the information, because of the aforementioned features most association convert their services and applications to the cloud. However, some malware ransom ware is difficult to detect without running them. The security information groups endure improving advanced procedures for encryption augmented to cloud facilities. This research focused on malware detection and resolving the security problems in cloud computing by using encryption techniques. The countermeasures for separate susceptibility are based on the investigation outcomes discussed. This comprehensive research supports the researchers in accomplishing a better solution for malware detection on cloud computing)","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060716
Kavita Bhatt, S. M. Kumar
In today's competitive world, sustainability is a key element for any organization. Integrating digital technologies to accelerate process and sustainability aligned to key elements of any organization like - people, process, strategy, technologies, revenues and extension of the organization to accelerate process is called Digital Transformation. Digital Transformation (DX) and its disruptive technologies has its own attached benefits that provides multiple opportunities and possibilities to MSMEs to promote their growth. Industry has moved from mechanized system to virtual world leveraging industry 4.0 practices like AI, machine learning, strong network connection and ensuring effective digital transformation from physical world to virtual world. Digital connectivity defines the pillar for adoption of advance technologies required for industrial revolution. Small and medium sized organization/manufacturing unit has great impact on country's economic growth and indirect impact on large scale companies. Micro, small and medium industries can be moved to digitization by leveraging industry 4.0 practices and maturity model. This paper suggest that fourth industry is growing exponentially in recent past, and it drives a need to derive the structural model technique to model relationship between organization and its sustainability functions. There is little study done on how small-scale companies can scale the digital transformation from conventional model to interconnected and virtual model. Studies are conducted on readiness level of the MSMEs in adopting Industry 4.0 standard. This paper discuss questions like how far the MSMEs are ready for digital transformation. Authors classified the MSMEs into various groups depending on level of Maturity parameter I4.0 measures, using the index aligned to industry 4.0 practices. This study finds out different dimensions suggested for development of industry 4.0 maturity and readiness model which need attention when moving forward for Industry 4.0 and its adoption and corresponding future framework. They are Strategy, Organization, Supply Chain, Manufacturing, Operations, Customers, Product, Services, Business Model, IT, People, Culture to assess an organization's I4.0 maturity and readiness levels.
{"title":"Reindustrialization Using Industry 4.0 Maturity Models in Msmes and Tenets of Digital Transformation Phases","authors":"Kavita Bhatt, S. M. Kumar","doi":"10.1109/ICERECT56837.2022.10060716","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060716","url":null,"abstract":"In today's competitive world, sustainability is a key element for any organization. Integrating digital technologies to accelerate process and sustainability aligned to key elements of any organization like - people, process, strategy, technologies, revenues and extension of the organization to accelerate process is called Digital Transformation. Digital Transformation (DX) and its disruptive technologies has its own attached benefits that provides multiple opportunities and possibilities to MSMEs to promote their growth. Industry has moved from mechanized system to virtual world leveraging industry 4.0 practices like AI, machine learning, strong network connection and ensuring effective digital transformation from physical world to virtual world. Digital connectivity defines the pillar for adoption of advance technologies required for industrial revolution. Small and medium sized organization/manufacturing unit has great impact on country's economic growth and indirect impact on large scale companies. Micro, small and medium industries can be moved to digitization by leveraging industry 4.0 practices and maturity model. This paper suggest that fourth industry is growing exponentially in recent past, and it drives a need to derive the structural model technique to model relationship between organization and its sustainability functions. There is little study done on how small-scale companies can scale the digital transformation from conventional model to interconnected and virtual model. Studies are conducted on readiness level of the MSMEs in adopting Industry 4.0 standard. This paper discuss questions like how far the MSMEs are ready for digital transformation. Authors classified the MSMEs into various groups depending on level of Maturity parameter I4.0 measures, using the index aligned to industry 4.0 practices. This study finds out different dimensions suggested for development of industry 4.0 maturity and readiness model which need attention when moving forward for Industry 4.0 and its adoption and corresponding future framework. They are Strategy, Organization, Supply Chain, Manufacturing, Operations, Customers, Product, Services, Business Model, IT, People, Culture to assess an organization's I4.0 maturity and readiness levels.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}