首页 > 最新文献

2022 International Conference on Electronics and Renewable Systems (ICEARS)最新文献

英文 中文
A Diagnostic Study on Prediction of Covid-19 by Symptoms Using Machine Learning 基于机器学习的新冠肺炎症状预测诊断研究
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752301
E. Devi, V. Athappan, Rahul R Rajendran, E. Devi, Dr.G. Emayavaramban, S. Sriragavi, Dr.M. Sivaramkrishnan
Effective screening helps for quick and accurate detection of COVID-19 and it also decreases the burden on the healthcare system. Prediction models with numerous criteria have been developed to estimate the probability of infection. These are designed to assist medical workers across the world in triaging victi ms, especially in places with limited medical resources. For predicting the COVID-19 using symptoms, the dataset is taken from the website of the Israeli Ministry of Health. The dataset contains 9 attributes and 2,78,848 samples. The raw dataset is cleaned using pre-processing techniques. The Machine learning algorithms like Random Forest, K Nearest Neighbor, Decision Tree, and hybrid Random Forest, K Nearest Neighbor, and Decision Tree are applied on the 1,95,194 samples to identify the model. The predicted model is tested on 83,654 samples to ensure the quality of the designed model. The performance metrics like ROC [Receiver Operating Characteristic] curve, True Positive and Negative Rate, False Positive and Negative Rate, Positive and Negative Predictive Value, and Accuracy are applied to check the model. From the evaluation result, the proposed hybrid model gives high accuracy of 98.97% . The proposed technique might be utilized to priorities COVID-19 screening when testing capabilities are constrained., among several other things.
有效的筛查有助于快速准确地发现COVID-19,还可以减轻医疗保健系统的负担。已经开发了具有许多标准的预测模型来估计感染的概率。这些工具旨在帮助世界各地的医务工作者对受害者进行分类,特别是在医疗资源有限的地方。为了利用症状预测COVID-19,数据集取自以色列卫生部的网站。数据集包含9个属性和2,78,848个样本。使用预处理技术清理原始数据集。采用随机森林、K近邻、决策树、混合随机森林、K近邻、决策树等机器学习算法对195194个样本进行模型识别。通过83654个样本对预测模型进行了验证,保证了模型的质量。采用ROC曲线、真阳性和阴性率、假阳性和阴性率、阳性和阴性预测值、准确率等性能指标对模型进行检验。从评价结果来看,所提出的混合模型准确率高达98.97%。该技术可用于在检测能力受限的情况下优先筛查COVID-19。等等。
{"title":"A Diagnostic Study on Prediction of Covid-19 by Symptoms Using Machine Learning","authors":"E. Devi, V. Athappan, Rahul R Rajendran, E. Devi, Dr.G. Emayavaramban, S. Sriragavi, Dr.M. Sivaramkrishnan","doi":"10.1109/ICEARS53579.2022.9752301","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752301","url":null,"abstract":"Effective screening helps for quick and accurate detection of COVID-19 and it also decreases the burden on the healthcare system. Prediction models with numerous criteria have been developed to estimate the probability of infection. These are designed to assist medical workers across the world in triaging victi ms, especially in places with limited medical resources. For predicting the COVID-19 using symptoms, the dataset is taken from the website of the Israeli Ministry of Health. The dataset contains 9 attributes and 2,78,848 samples. The raw dataset is cleaned using pre-processing techniques. The Machine learning algorithms like Random Forest, K Nearest Neighbor, Decision Tree, and hybrid Random Forest, K Nearest Neighbor, and Decision Tree are applied on the 1,95,194 samples to identify the model. The predicted model is tested on 83,654 samples to ensure the quality of the designed model. The performance metrics like ROC [Receiver Operating Characteristic] curve, True Positive and Negative Rate, False Positive and Negative Rate, Positive and Negative Predictive Value, and Accuracy are applied to check the model. From the evaluation result, the proposed hybrid model gives high accuracy of 98.97% . The proposed technique might be utilized to priorities COVID-19 screening when testing capabilities are constrained., among several other things.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132197328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An LPWAN Based Indoor & Outdoor Continuous Live Stock Monitoring System 基于LPWAN的室内外牲畜连续监测系统
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752016
Saleem Akram P, Kanakaraja P, Naveen Mani Bhaskar Ch, Jaideep M, Shanmukh D
The advancement of the Web of Things is turning out to be increasingly more popular with its first home mechanisation status. This paper covers the planning, execution, and activity of IoT equipment and programming intended for ceaseless domesticated animals observing in horse shelters and during planning. LoRa Low Power Wide Region Organisation (LPWAN) innovation is used to cover various areas, as well as the proper setup of web administrations for data storage, examination, and perception. Since LPWAN focal access controls (Macintosh) layers doesn't provide a pre-discourse listening strategy, Macintosh layer is provided with more organisation-based admittance to keep away from struggle (CSMA/CA). The framework is planned utilising off-the-rack equipment, and its presentation is additionally estimated with the assistance format. The underlying aftereffects of the utilisation of HW in the field guarantee the soundness of the anecdotal framework and its dependability.
物联网的进步正变得越来越受欢迎,它的第一个家庭机械化地位。本文涵盖了物联网设备和编程的规划、执行和活动,这些设备和编程旨在不断地在马舍中观察家养动物并在规划期间进行。LoRa低功率广域组织(LPWAN)创新用于覆盖各个领域,以及为数据存储、检查和感知适当设置web管理。由于LPWAN焦点访问控制(Macintosh)层不提供话语前聆听策略,因此Macintosh层提供了更多基于组织的准入以避免冲突(CSMA/CA)。该框架是利用现成的设备进行规划的,其呈现方式也以辅助格式进行评估。在实地使用人力资源的潜在后果保证了轶事框架的健全及其可靠性。
{"title":"An LPWAN Based Indoor & Outdoor Continuous Live Stock Monitoring System","authors":"Saleem Akram P, Kanakaraja P, Naveen Mani Bhaskar Ch, Jaideep M, Shanmukh D","doi":"10.1109/ICEARS53579.2022.9752016","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752016","url":null,"abstract":"The advancement of the Web of Things is turning out to be increasingly more popular with its first home mechanisation status. This paper covers the planning, execution, and activity of IoT equipment and programming intended for ceaseless domesticated animals observing in horse shelters and during planning. LoRa Low Power Wide Region Organisation (LPWAN) innovation is used to cover various areas, as well as the proper setup of web administrations for data storage, examination, and perception. Since LPWAN focal access controls (Macintosh) layers doesn't provide a pre-discourse listening strategy, Macintosh layer is provided with more organisation-based admittance to keep away from struggle (CSMA/CA). The framework is planned utilising off-the-rack equipment, and its presentation is additionally estimated with the assistance format. The underlying aftereffects of the utilisation of HW in the field guarantee the soundness of the anecdotal framework and its dependability.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131861230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Approach towards Network Security of an Organization 组织网络安全的改进方法
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9751998
R. Vijaya Saraswathi, Sk Iftequar Ahmed, M. Sriveda Reddy, S. Akshay, M. Vrushik Reddy, M. Sanjana Reddy
More and more publicly available servers are becoming vulnerable to unauthenticated and unauthorized accesses, and intrusions are becoming much more common. As the size and number of networks and the Internet traffic expands, the requirement for intrusion detection grows, as does the need to reduce the burden associated with intrusion detection. Not only is it vital for a network/server administrator to ensure client performance, but it is also important to prevent unwanted access. The rise in the number of network threats is becoming a serious concern and detecting them is becoming increasingly more difficult. And the demand for a more advanced and logical intrusion detection system is growing at a rapid pace. The high rate of false/fake alarms is a fundamental flaw in existing systems. Honeypots can be a good way to improve the network’s overall dependability and security in this situation. Therefore, a self-improving approach towards security of the organizations can greatly help in tackling this kind of unauthorized accesses and data breaches. By the term self-improving, it means all the fixes are incorporated for the latest vulnerabilities found by using the attacker’s knowledge
越来越多的公共服务器容易受到未经身份验证和未经授权的访问,入侵也变得越来越普遍。随着网络的规模和数量以及Internet流量的增长,对入侵检测的需求也在增长,同时也需要减少与入侵检测相关的负担。对于网络/服务器管理员来说,确保客户机性能不仅至关重要,而且防止不必要的访问也很重要。网络威胁数量的增加正成为一个严重的问题,检测它们变得越来越困难。对更先进、更符合逻辑的入侵检测系统的需求正在快速增长。高误报率是现有系统的一个根本缺陷。在这种情况下,蜜罐可以很好地提高网络的整体可靠性和安全性。因此,组织安全的自我改进方法可以极大地帮助处理这种未经授权的访问和数据泄露。所谓自我改进,是指利用攻击者的知识发现的最新漏洞的所有修复程序都被纳入其中
{"title":"An Improved Approach towards Network Security of an Organization","authors":"R. Vijaya Saraswathi, Sk Iftequar Ahmed, M. Sriveda Reddy, S. Akshay, M. Vrushik Reddy, M. Sanjana Reddy","doi":"10.1109/ICEARS53579.2022.9751998","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751998","url":null,"abstract":"More and more publicly available servers are becoming vulnerable to unauthenticated and unauthorized accesses, and intrusions are becoming much more common. As the size and number of networks and the Internet traffic expands, the requirement for intrusion detection grows, as does the need to reduce the burden associated with intrusion detection. Not only is it vital for a network/server administrator to ensure client performance, but it is also important to prevent unwanted access. The rise in the number of network threats is becoming a serious concern and detecting them is becoming increasingly more difficult. And the demand for a more advanced and logical intrusion detection system is growing at a rapid pace. The high rate of false/fake alarms is a fundamental flaw in existing systems. Honeypots can be a good way to improve the network’s overall dependability and security in this situation. Therefore, a self-improving approach towards security of the organizations can greatly help in tackling this kind of unauthorized accesses and data breaches. By the term self-improving, it means all the fixes are incorporated for the latest vulnerabilities found by using the attacker’s knowledge","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Logical Data Security Establishment over Wireless Communications using Media based Steganographic Scheme 一种基于媒体隐写的无线通信逻辑数据安全机制
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752183
I. Chandra, Mohana Sundari L, N. Ashok Kumar, Ngangbam Phalguni Singh, Joshuva Arockia Dhanraj
Internet speeds and technological advancements have made individuals increasingly concerned about their personal information being compromised by criminals. There have been a slew of new steganography and data concealment methods suggested in recent years. Steganography is the art of hiding information in plain sight (text, audio, image and video). Unauthorized users now have access to steganographic analysis software, which may be used to retrieve the carrier files valuable secret information. Unfortunately, because to their inefficiency and lack of security, certain steganography techniques are readily detectable by steganalytical detectors. We present a video steganography technique based on the linear block coding concept that is safe and secure. Data is protected using a binary graphic logo but also nine uncompressed video sequences as cover data and a secret message. It's possible to enhance the security by rearranging pixels randomly in both the cover movies and the hidden message. Once the secret message has been encoded using the Hamming algorithm (7, 4) before being embedded, the message is even more secure. The XOR function will be used to add the encoded message's result to a random set of values. Once the message has been sufficiently secured, it may be inserted into the video frames of the cover. In addition, each frame's embedding region is chosen at random so that the steganography scheme's resilience can be improved. In addition, our experiments have shown that the approach has a high embedding efficiency. The video quality of stego movies is quite close to the original, with a PSNR (Pick Signal to Noise Ratio) over 51 dB. Embedding a payload of up to 90 Kbits per frame is also permissible, as long as the quality of the stego video is not noticeably degraded.
互联网的速度和技术的进步使个人越来越担心他们的个人信息被犯罪分子窃取。近年来,出现了一系列新的隐写和数据隐藏方法。隐写术是将信息隐藏在显而易见的地方(文本、音频、图像和视频)的艺术。未经授权的用户现在可以访问隐写分析软件,这可能被用来检索载体文件有价值的秘密信息。不幸的是,由于其效率低下和缺乏安全性,某些隐写技术很容易被隐写检测器检测到。提出了一种安全可靠的基于线性分组编码的视频隐写技术。数据保护使用二进制图形标识,但也有九个未压缩的视频序列作为掩护数据和秘密消息。可以通过在封面电影和隐藏信息中随机重新排列像素来增强安全性。一旦秘密消息在嵌入之前使用汉明算法(7,4)进行编码,消息就更加安全了。XOR函数将用于将编码消息的结果添加到一组随机值中。一旦信息得到充分保护,就可以插入封面的视频帧中。此外,每帧的嵌入区域都是随机选择的,从而提高了隐写方案的弹性。实验结果表明,该方法具有较高的嵌入效率。隐写电影的视频质量非常接近原版,PSNR(拾取信噪比)超过51 dB。嵌入每帧90 kb的有效载荷也是允许的,只要隐写视频的质量没有明显下降。
{"title":"A Logical Data Security Establishment over Wireless Communications using Media based Steganographic Scheme","authors":"I. Chandra, Mohana Sundari L, N. Ashok Kumar, Ngangbam Phalguni Singh, Joshuva Arockia Dhanraj","doi":"10.1109/ICEARS53579.2022.9752183","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752183","url":null,"abstract":"Internet speeds and technological advancements have made individuals increasingly concerned about their personal information being compromised by criminals. There have been a slew of new steganography and data concealment methods suggested in recent years. Steganography is the art of hiding information in plain sight (text, audio, image and video). Unauthorized users now have access to steganographic analysis software, which may be used to retrieve the carrier files valuable secret information. Unfortunately, because to their inefficiency and lack of security, certain steganography techniques are readily detectable by steganalytical detectors. We present a video steganography technique based on the linear block coding concept that is safe and secure. Data is protected using a binary graphic logo but also nine uncompressed video sequences as cover data and a secret message. It's possible to enhance the security by rearranging pixels randomly in both the cover movies and the hidden message. Once the secret message has been encoded using the Hamming algorithm (7, 4) before being embedded, the message is even more secure. The XOR function will be used to add the encoded message's result to a random set of values. Once the message has been sufficiently secured, it may be inserted into the video frames of the cover. In addition, each frame's embedding region is chosen at random so that the steganography scheme's resilience can be improved. In addition, our experiments have shown that the approach has a high embedding efficiency. The video quality of stego movies is quite close to the original, with a PSNR (Pick Signal to Noise Ratio) over 51 dB. Embedding a payload of up to 90 Kbits per frame is also permissible, as long as the quality of the stego video is not noticeably degraded.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115563583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Power Optimized Ternary Arithmetic Logic Circuit using Carbon Nano Tube Field Effect Transistor 基于碳纳米管场效应晶体管的功率优化三元算术逻辑电路
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752391
A. Latha, S. Murugeswaran, G. Yamuna
Ternary Logic Circuits have gained the crucial attention of all the semiconductor researchers as it provides better interconnect, power, performance and speed when compared to the conventional binary logics. There is a minimal area overhead in ternary logics but that’s permissible as long as other parameters provide a much beneficial results. Carbon Nano Tube (CNT) Transistors are a remarkable replacement for the conventional Complementary Metal Oxide Semiconductors (CMOS) as they exhibit better electrical connectivity, structural abilities and mechanical properties. The main focus of present-day requirements are designing and developing power optimized high speed circuits without compromising on performance and area. So, to achieve all these, this research work focus on combining both the high-profile techniques to build Low Powered Ternary Arithmetic Logic Circuits (LP- TALCs) using CNT transistors. ALCs plays the major role as the basic operating unit for any processors or circuits which helps to perform arithmetic operations and logic operations in single structure. The various logic operations performed by this TALC circuit is Buffer, Inversion, Ternary NAND, Ternary NOR, Ternary AND, Ternary OR, Ternary Adder, Ternary Subtractor and Ternary Comparator. The structure basically consists of Low Power Enabled Decoder (LPED), Functional modules and Output selection circuit (OSC). LPED circuit helps to achieve low power by enabling the selected circuit operations using decoder circuits and the inputs are fed to functional modules which consists of all the logical structure and finally the output selection circuit consists of encoders which deliver the final output function. The proposed structure is designed using 32nm CNTFET technology and the simulation results shows almost 90% power reduction to their binary counterpart and 85% Power delay product improvement.
与传统的二进制逻辑相比,三元逻辑电路具有更好的互连性、功耗、性能和速度,因此受到了所有半导体研究人员的高度关注。在三元逻辑中有一个最小的面积开销,但只要其他参数提供非常有益的结果,这是允许的。碳纳米管(CNT)晶体管是传统互补金属氧化物半导体(CMOS)的重要替代品,因为它们具有更好的电连通性、结构能力和机械性能。当前需求的主要焦点是设计和开发功率优化的高速电路,而不影响性能和面积。因此,为了实现这一切,本研究工作的重点是将这两种高水平的技术结合起来,利用碳纳米管晶体管构建低功耗三元算术逻辑电路(LP- TALCs)。alc作为任何处理器或电路的基本操作单元起着主要作用,它有助于在单一结构中执行算术运算和逻辑运算。该TALC电路执行的各种逻辑运算是缓冲、反转、三元非与、三元非与、三元与、三元或、三元加、三元减、三元比较。该结构主要由低功耗译码器(LPED)、功能模块和输出选择电路(OSC)组成。LPED电路通过使用解码器电路使所选电路操作能够帮助实现低功耗,输入被馈送到由所有逻辑结构组成的功能模块,最后输出选择电路由提供最终输出功能的编码器组成。该结构采用32nm CNTFET技术设计,仿真结果表明,与二进制结构相比,该结构功耗降低近90%,功耗延迟产品改善85%。
{"title":"Power Optimized Ternary Arithmetic Logic Circuit using Carbon Nano Tube Field Effect Transistor","authors":"A. Latha, S. Murugeswaran, G. Yamuna","doi":"10.1109/ICEARS53579.2022.9752391","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752391","url":null,"abstract":"Ternary Logic Circuits have gained the crucial attention of all the semiconductor researchers as it provides better interconnect, power, performance and speed when compared to the conventional binary logics. There is a minimal area overhead in ternary logics but that’s permissible as long as other parameters provide a much beneficial results. Carbon Nano Tube (CNT) Transistors are a remarkable replacement for the conventional Complementary Metal Oxide Semiconductors (CMOS) as they exhibit better electrical connectivity, structural abilities and mechanical properties. The main focus of present-day requirements are designing and developing power optimized high speed circuits without compromising on performance and area. So, to achieve all these, this research work focus on combining both the high-profile techniques to build Low Powered Ternary Arithmetic Logic Circuits (LP- TALCs) using CNT transistors. ALCs plays the major role as the basic operating unit for any processors or circuits which helps to perform arithmetic operations and logic operations in single structure. The various logic operations performed by this TALC circuit is Buffer, Inversion, Ternary NAND, Ternary NOR, Ternary AND, Ternary OR, Ternary Adder, Ternary Subtractor and Ternary Comparator. The structure basically consists of Low Power Enabled Decoder (LPED), Functional modules and Output selection circuit (OSC). LPED circuit helps to achieve low power by enabling the selected circuit operations using decoder circuits and the inputs are fed to functional modules which consists of all the logical structure and finally the output selection circuit consists of encoders which deliver the final output function. The proposed structure is designed using 32nm CNTFET technology and the simulation results shows almost 90% power reduction to their binary counterpart and 85% Power delay product improvement.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Moisture Level Maintenance and Baking Process of Semiconductor Components 半导体元件的自动湿度维持和烘烤过程
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9751916
Thillai Rani M, Sam Jebastin J, Sangesh V, Shemsingh Cyrus G
Printed circuit boards (PCBs) and semiconductor electronic components are often stored in a vacuum sealed moisture barrier bag. Further moisture protection is ensured with the use of humidity indicator cards and desiccant packs. The humidity indicator cards are manually checked, and the components are subjected to hot air drying based on the moisture level. In this paper, an automated approach is proposed for this process. The moisture content in the device is measured using moisture sensor and the microcontroller will initiate baking based on its input. If it is normal level the microcontroller will be in normal state, if it reaches the threshold, representing the presence of moisture, the microcontroller will provide instructions to dry the board or de vice using a hot air-drying oven at the required temperature based on the level of moisture. This helps in extending the shelf life by removal of moisture from the semiconductor de vice and enables effective utilization in production or storage line.
印刷电路板(pcb)和半导体电子元件通常储存在真空密封防潮袋中。进一步的水分保护是确保使用湿度指示卡和干燥剂包。手动检查湿度指示卡,并根据湿度对部件进行热风干燥。本文提出了一种自动化的方法来实现这一过程。使用湿度传感器测量设备中的水分含量,微控制器将根据其输入启动烘烤。如果是正常水平,微控制器将处于正常状态,如果达到阈值,表示存在水分,微控制器将提供指示,使用热风烘箱在所需的温度下根据水分水平干燥板或设备。这有助于通过去除半导体器件中的水分来延长保质期,并使生产或存储线能够有效地利用。
{"title":"Automated Moisture Level Maintenance and Baking Process of Semiconductor Components","authors":"Thillai Rani M, Sam Jebastin J, Sangesh V, Shemsingh Cyrus G","doi":"10.1109/ICEARS53579.2022.9751916","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751916","url":null,"abstract":"Printed circuit boards (PCBs) and semiconductor electronic components are often stored in a vacuum sealed moisture barrier bag. Further moisture protection is ensured with the use of humidity indicator cards and desiccant packs. The humidity indicator cards are manually checked, and the components are subjected to hot air drying based on the moisture level. In this paper, an automated approach is proposed for this process. The moisture content in the device is measured using moisture sensor and the microcontroller will initiate baking based on its input. If it is normal level the microcontroller will be in normal state, if it reaches the threshold, representing the presence of moisture, the microcontroller will provide instructions to dry the board or de vice using a hot air-drying oven at the required temperature based on the level of moisture. This helps in extending the shelf life by removal of moisture from the semiconductor de vice and enables effective utilization in production or storage line.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"49 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114318698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of AES and RSA algorithms based on GPUs 基于gpu的AES和RSA算法研究
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752356
GK Yudheksha, Prince Kumar, S. Keerthana
Combining the characteristics of GPUs and CPUs can greatly enhance the performance and bandwidth, though their design philosophies are inherently different. This research paper focuses on the GPU parallel computing technologies for encryption of AES and RSA algorithms. With the arrival of NVIDIA Technology’s Compute Unified Device Architecture (CUDA), the graphics processing unit (GPU) has shifted from graphics-capable devices to universal sequence streamline units. Cryptography is about the security techniques. The Advanced Encryption Standard (AES) is widely used in the file encryption, wireless security, SSL/TLS, etc. However, its execution efficiency can still be improved to provide better security. Similarly, improvements can also be made in serial implementations of the RSA algorithm. Parallel implementation of security algorithms has been shown to improve execution efficiency in comparison to serial implementation. This research paper focuses on parallel implementation of AES and RSA algorithms on GPU to enhance performance and energy efficiency in comparison to CPU
结合gpu和cpu的特性可以极大地提高性能和带宽,尽管它们的设计理念本质上是不同的。本文主要研究了GPU并行计算技术在AES和RSA算法加密中的应用。随着NVIDIA技术的计算统一设备架构(CUDA)的到来,图形处理单元(GPU)已经从具有图形功能的设备转变为通用序列流线单元。密码学是关于安全技术的。高级加密标准AES (Advanced Encryption Standard)广泛应用于文件加密、无线安全、SSL/TLS等领域。但是,它的执行效率仍然可以提高,以提供更好的安全性。同样,也可以在RSA算法的串行实现中进行改进。与串行实现相比,安全算法的并行实现已被证明可以提高执行效率。本文的研究重点是AES和RSA算法在GPU上的并行实现,以提高与CPU相比的性能和能效
{"title":"A study of AES and RSA algorithms based on GPUs","authors":"GK Yudheksha, Prince Kumar, S. Keerthana","doi":"10.1109/ICEARS53579.2022.9752356","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752356","url":null,"abstract":"Combining the characteristics of GPUs and CPUs can greatly enhance the performance and bandwidth, though their design philosophies are inherently different. This research paper focuses on the GPU parallel computing technologies for encryption of AES and RSA algorithms. With the arrival of NVIDIA Technology’s Compute Unified Device Architecture (CUDA), the graphics processing unit (GPU) has shifted from graphics-capable devices to universal sequence streamline units. Cryptography is about the security techniques. The Advanced Encryption Standard (AES) is widely used in the file encryption, wireless security, SSL/TLS, etc. However, its execution efficiency can still be improved to provide better security. Similarly, improvements can also be made in serial implementations of the RSA algorithm. Parallel implementation of security algorithms has been shown to improve execution efficiency in comparison to serial implementation. This research paper focuses on parallel implementation of AES and RSA algorithms on GPU to enhance performance and energy efficiency in comparison to CPU","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115089545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brain Tumor Classification using Ensemble Classifiers 使用集成分类器的脑肿瘤分类
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752177
M. Venkata Subbarao, G. Challa Ram, D. Girish Kumar, Sudheer Kumar Terlapu
In Medical analysis and treatment the primary step is to identify the presence of tumor in brain and the effected area. In this regard, Brain Tumor (BT) classification helps the doctor to know the stage of tumor. This paper presents BT classification using a set of ensemble classifiers (EC). To train the classifier 17 redundant noise features are extracted from the MRI images. In training phase, these features are fed to variety of EC classifiers for learning. In testing phase, the trained model is used to identify the class of MRI image. Performance of proposed EC classifiers are analyzed under different training rates. Performance is analyzed for different MR image data sets under different training rates. Experimental results depicted that EC classifiers performance is superior than most of the traditional machine learning (ML) classifiers such as random forecasting, logistic regression, and naive bayes classifiers.
在医学分析和治疗中,首要的步骤是确定肿瘤是否存在于大脑和患处。对此,脑肿瘤(BT)分类有助于医生了解肿瘤的分期。本文提出了一种基于集成分类器的BT分类方法。为了训练分类器,从MRI图像中提取了17个冗余噪声特征。在训练阶段,将这些特征输入到各种EC分类器中进行学习。在测试阶段,使用训练好的模型来识别MRI图像的类别。在不同的训练速率下,分析了所提出的EC分类器的性能。分析了不同训练速率下不同磁共振图像数据集的性能。实验结果表明,EC分类器的性能优于大多数传统的机器学习分类器,如随机预测、逻辑回归和朴素贝叶斯分类器。
{"title":"Brain Tumor Classification using Ensemble Classifiers","authors":"M. Venkata Subbarao, G. Challa Ram, D. Girish Kumar, Sudheer Kumar Terlapu","doi":"10.1109/ICEARS53579.2022.9752177","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752177","url":null,"abstract":"In Medical analysis and treatment the primary step is to identify the presence of tumor in brain and the effected area. In this regard, Brain Tumor (BT) classification helps the doctor to know the stage of tumor. This paper presents BT classification using a set of ensemble classifiers (EC). To train the classifier 17 redundant noise features are extracted from the MRI images. In training phase, these features are fed to variety of EC classifiers for learning. In testing phase, the trained model is used to identify the class of MRI image. Performance of proposed EC classifiers are analyzed under different training rates. Performance is analyzed for different MR image data sets under different training rates. Experimental results depicted that EC classifiers performance is superior than most of the traditional machine learning (ML) classifiers such as random forecasting, logistic regression, and naive bayes classifiers.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115094798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Development of Key Technologies of Legal Case Management Information System Considering QoS Optimization 考虑QoS优化的案件管理信息系统关键技术开发
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9751871
Wen Yuan
This paper conducts the development of the key technologies of the legal case management information system considering QoS optimization. The designed system administrator can carry out that the all-round management of the system, including account management, database management, security setting management, core data entry management, and data statistics management. With this help, the QoS optimization model is then integrated to improve the systematic performance of the system as the key technology. Similar to the layering in the data source, the data set is composed of the fields of the data set, and contains the relevant information of the attribute fields of various entity element categories. Furthermore, the designed system is analyzed and implemented on the public data sets to show the results.
本文对考虑QoS优化的案件管理信息系统的关键技术进行了开发。所设计的系统管理员可以对系统进行全方位的管理,包括账户管理、数据库管理、安全设置管理、核心数据录入管理、数据统计管理等。在此基础上,结合QoS优化模型,作为关键技术提高系统性能。与数据源中的分层类似,数据集由数据集的字段组成,包含各种实体元素类别的属性字段的相关信息。最后,对所设计的系统进行了分析,并在公共数据集上进行了实现。
{"title":"Development of Key Technologies of Legal Case Management Information System Considering QoS Optimization","authors":"Wen Yuan","doi":"10.1109/ICEARS53579.2022.9751871","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751871","url":null,"abstract":"This paper conducts the development of the key technologies of the legal case management information system considering QoS optimization. The designed system administrator can carry out that the all-round management of the system, including account management, database management, security setting management, core data entry management, and data statistics management. With this help, the QoS optimization model is then integrated to improve the systematic performance of the system as the key technology. Similar to the layering in the data source, the data set is composed of the fields of the data set, and contains the relevant information of the attribute fields of various entity element categories. Furthermore, the designed system is analyzed and implemented on the public data sets to show the results.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116960263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Sensitive IoT Nanotechnology Sensors for Improved Data Acquisition and Processing 用于改进数据采集和处理的高灵敏度物联网纳米技术传感器
Pub Date : 2022-03-16 DOI: 10.1109/ICEARS53579.2022.9752333
Sirak Gebrehiyot, M. Madiajagan, B. Pattanaik, E. Balamurugan, S. Selvakanmani, S. Vijayarangam
Internet of Nano-Things is regarded as an extensive model for future applications that deploys an improved technical knowledge on data acquisition and classification. In this paper, we utilize the availability of gold nanoclusters in Internet of Things (IoT) sensors over a monolayer of grapheme film that tends to change with respect to the sensing properties. These IoT devices are utilized for transmit the sensing parameters to the local hub that deposits or offloads the data to cloud. The input data is then processed and classified to test the efficacy rate of the IoT sensors. The simulation is conducted on a real-time IoT nanotechnology sensor device to test the accuracy of data acquisition. The results show that the proposed model with nanotechnology IoT sensor is effective in capturing the data at a higher response and accurate rate than other methods.
纳米物联网被认为是未来应用的广泛模型,它部署了改进的数据采集和分类技术知识。在本文中,我们利用金纳米团簇在物联网(IoT)传感器中的可用性,在单层石墨烯薄膜上,石墨烯薄膜倾向于随传感特性而变化。这些物联网设备用于将传感参数传输到本地集线器,该集线器将数据存储或卸载到云。然后对输入数据进行处理和分类,以测试物联网传感器的效率。在实时物联网纳米传感器设备上进行仿真,测试数据采集的准确性。结果表明,采用纳米技术的物联网传感器可以有效捕获数据,并且具有更高的响应率和准确率。
{"title":"High Sensitive IoT Nanotechnology Sensors for Improved Data Acquisition and Processing","authors":"Sirak Gebrehiyot, M. Madiajagan, B. Pattanaik, E. Balamurugan, S. Selvakanmani, S. Vijayarangam","doi":"10.1109/ICEARS53579.2022.9752333","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752333","url":null,"abstract":"Internet of Nano-Things is regarded as an extensive model for future applications that deploys an improved technical knowledge on data acquisition and classification. In this paper, we utilize the availability of gold nanoclusters in Internet of Things (IoT) sensors over a monolayer of grapheme film that tends to change with respect to the sensing properties. These IoT devices are utilized for transmit the sensing parameters to the local hub that deposits or offloads the data to cloud. The input data is then processed and classified to test the efficacy rate of the IoT sensors. The simulation is conducted on a real-time IoT nanotechnology sensor device to test the accuracy of data acquisition. The results show that the proposed model with nanotechnology IoT sensor is effective in capturing the data at a higher response and accurate rate than other methods.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123704195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Electronics and Renewable Systems (ICEARS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1