Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752265
Sanjay S Tippannavar, Shivaprasad N, P. S
The 21st century is an era of technology. Technology has undoubtedly changed the way of living. It has an impact on the lives and redefined the fact of living. The smart home can monitor the temperature, fire, water level, automatic door lock, PIR sensor along with IR sensor placed around the house to monitor the house which guarantees the family's safety, smoke sensor and non-contact water level controller. It comprises of a personal computer (PC) as the communication medium, including the LabVIEW software installed on the PC and the Arduino micro-controller board coded and integrated with sensors and voice synthesizers which provide feedback thus assuring & notifying the user about the Smart Home. Invention of this smart home gives us a safe, convenient, and fully automated system.
{"title":"Smart Home Automation Implemented using LabVIEW and Arduino","authors":"Sanjay S Tippannavar, Shivaprasad N, P. S","doi":"10.1109/ICEARS53579.2022.9752265","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752265","url":null,"abstract":"The 21st century is an era of technology. Technology has undoubtedly changed the way of living. It has an impact on the lives and redefined the fact of living. The smart home can monitor the temperature, fire, water level, automatic door lock, PIR sensor along with IR sensor placed around the house to monitor the house which guarantees the family's safety, smoke sensor and non-contact water level controller. It comprises of a personal computer (PC) as the communication medium, including the LabVIEW software installed on the PC and the Arduino micro-controller board coded and integrated with sensors and voice synthesizers which provide feedback thus assuring & notifying the user about the Smart Home. Invention of this smart home gives us a safe, convenient, and fully automated system.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131281758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9751843
A. Amudha, M. Siva Ramkumar, K. Balachander, G. Emayavaramban, G. N, S. S, Suresh Mt
There is a considerable chance of fire breakouts in industries such as petroleum, chemical, oils, & gas, resulting in massive devastation, destruction of livelihood, and the great majority of all, the loss of life. When an event happens, it's essential to have a mechanism in place that can alert authorized personnel and ensure that the premises are safe. In order to detect fires (via smoke as well as temperature sensors) and LPG leaks, an IOT-based industrial problem detection project was created. Data is sent to a remote location through the Internet of Things (IoT). 'Things' can communicate with sensors, circuits, programs, and accessibility through the Internet of Things (IOT). Human interaction is unnecessary for these technologies.(p)(p)Monitoring voltage and current consumption by industry is also a feature of this system. Use this tool to locate the hottest area, which may be assessed by determining the most hazardous area for people or production. A current sensor measures the overall amount of current consumed by the industrial sector. ' If the power exceeds the threshold and the load is tripped, the IOT cloud app will notify the appropriate person.
{"title":"Monitoring Of Industrial Electrical Equipments","authors":"A. Amudha, M. Siva Ramkumar, K. Balachander, G. Emayavaramban, G. N, S. S, Suresh Mt","doi":"10.1109/ICEARS53579.2022.9751843","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751843","url":null,"abstract":"There is a considerable chance of fire breakouts in industries such as petroleum, chemical, oils, & gas, resulting in massive devastation, destruction of livelihood, and the great majority of all, the loss of life. When an event happens, it's essential to have a mechanism in place that can alert authorized personnel and ensure that the premises are safe. In order to detect fires (via smoke as well as temperature sensors) and LPG leaks, an IOT-based industrial problem detection project was created. Data is sent to a remote location through the Internet of Things (IoT). 'Things' can communicate with sensors, circuits, programs, and accessibility through the Internet of Things (IOT). Human interaction is unnecessary for these technologies.(p)(p)Monitoring voltage and current consumption by industry is also a feature of this system. Use this tool to locate the hottest area, which may be assessed by determining the most hazardous area for people or production. A current sensor measures the overall amount of current consumed by the industrial sector. ' If the power exceeds the threshold and the load is tripped, the IOT cloud app will notify the appropriate person.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133223307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752343
Ellia Twinamatsiko, Dinesh Kumar
Over the years, the number of firms measuring and reporting environmental, social, and governance data has seen a massive shift due to the overwhelming demand and pressure from different stakeholders. The introduction of various international regulatory bodies like the Corporate Sustainability Reporting Directive (CSRD), has also been intentional in encouraging companies to disclose publicly documents like annual reports, integrated reports in regards to topics like social, environmental, employee affairs and human rights. When it comes to investing, ESG issues take into account a firm’s operational influence on the native environment. Customers, policy makers, investors, and regulators are exerting huge amount of pressure on Companies to carry out Environmental, Social, and Governance ("ESG") reporting also known as non-financial reporting. Sustainability reporting has previously exhibited numerous advantages to businesses as accurate data collection and reporting are essential for managing the company’s sustainability performance as well as improving financial decision making. It is vital for a company’s long-term performance to actively disclose and communicate its non-financial practices and approaches. Therefore, in order to answer questions like; “Is it vital for developing market firms to disclose non-financial information, such as that relating to environmental, social, and governance (ESG)?”, this paper will attempt to provide a deeper insight into ESG disclosure and the impact it has on Firm Performance using Machine Learning techniques (Regression) and performance Ratios (Return On Assets & Return On Equity).
{"title":"Incorporating ESG in Decision Making for Responsible and Sustainable Investments using Machine Learning","authors":"Ellia Twinamatsiko, Dinesh Kumar","doi":"10.1109/ICEARS53579.2022.9752343","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752343","url":null,"abstract":"Over the years, the number of firms measuring and reporting environmental, social, and governance data has seen a massive shift due to the overwhelming demand and pressure from different stakeholders. The introduction of various international regulatory bodies like the Corporate Sustainability Reporting Directive (CSRD), has also been intentional in encouraging companies to disclose publicly documents like annual reports, integrated reports in regards to topics like social, environmental, employee affairs and human rights. When it comes to investing, ESG issues take into account a firm’s operational influence on the native environment. Customers, policy makers, investors, and regulators are exerting huge amount of pressure on Companies to carry out Environmental, Social, and Governance (\"ESG\") reporting also known as non-financial reporting. Sustainability reporting has previously exhibited numerous advantages to businesses as accurate data collection and reporting are essential for managing the company’s sustainability performance as well as improving financial decision making. It is vital for a company’s long-term performance to actively disclose and communicate its non-financial practices and approaches. Therefore, in order to answer questions like; “Is it vital for developing market firms to disclose non-financial information, such as that relating to environmental, social, and governance (ESG)?”, this paper will attempt to provide a deeper insight into ESG disclosure and the impact it has on Firm Performance using Machine Learning techniques (Regression) and performance Ratios (Return On Assets & Return On Equity).","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133451755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752267
P. William, Siddhartha Choubey, M. Ramkumar, Apurv Verma, K. Vengatesan, Abha Choubey
In this study, we suggest a revolutionary network architectural design strategy for future 5G mobile networks, which we believe would be beneficial. The proposed design is based on a mobile environment that is centered on the user and incorporates a range of wireless and mobile technologies to achieve this. Because it is impossible to make changes to any wireless technology, new or old, in a heterogeneous wireless environment, each solution for next-generation mobile and wireless networks should be implemented in the service stratum, whereas radio access technologies should be implemented in the transport stratum in the Next-Generation Networks approach. The user terminal in the proposed design has the option of altering the Radio Access Technology - RAT based on the parameters that have been supplied. This paper introduces the Policy-Router, which is a node in the core network that constructs IP tunnels to the mobile terminal across many available RATs to the terminal, while enabling the mobile terminal to change RATs in an unobtrusive manner. After learning about the RAT via the mobile terminal's performance measurements, the mobile terminal selects the RAT by executing a multi-criteria decision-making process using the specified user agent. In this paper, we describe the QoSPRO methodology, which allows control information to be shared between the mobile terminal and the Policy Router throughout the performance evaluation procedure.
{"title":"Implementation of 5G Network Architecture with Interoperability in Heterogeneous Wireless Environment using Radio Spectrum","authors":"P. William, Siddhartha Choubey, M. Ramkumar, Apurv Verma, K. Vengatesan, Abha Choubey","doi":"10.1109/ICEARS53579.2022.9752267","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752267","url":null,"abstract":"In this study, we suggest a revolutionary network architectural design strategy for future 5G mobile networks, which we believe would be beneficial. The proposed design is based on a mobile environment that is centered on the user and incorporates a range of wireless and mobile technologies to achieve this. Because it is impossible to make changes to any wireless technology, new or old, in a heterogeneous wireless environment, each solution for next-generation mobile and wireless networks should be implemented in the service stratum, whereas radio access technologies should be implemented in the transport stratum in the Next-Generation Networks approach. The user terminal in the proposed design has the option of altering the Radio Access Technology - RAT based on the parameters that have been supplied. This paper introduces the Policy-Router, which is a node in the core network that constructs IP tunnels to the mobile terminal across many available RATs to the terminal, while enabling the mobile terminal to change RATs in an unobtrusive manner. After learning about the RAT via the mobile terminal's performance measurements, the mobile terminal selects the RAT by executing a multi-criteria decision-making process using the specified user agent. In this paper, we describe the QoSPRO methodology, which allows control information to be shared between the mobile terminal and the Policy Router throughout the performance evaluation procedure.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133755655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752263
yellamma pachipala, M. Harika, B. Aakanksha, M. Kavitha
Objects in the home that are often used tend to follow specific patterns in terms of time and location. Analyzing these trends can help us keep track of our belongings and increase efficiency by reducing the amount of time wasted forgetting or looking for them. Tensor Flow, a relatively new framework from Google, was utilised to model our neural network in our project. Multiple objects in real-time video streams are detected using the Tensor Flow Object Detection API. The system then detects trends and alerts the user if an abnormality is discovered. Finding REMO—detecting relative mobility patterns in geographic lifelines is a study reported by Laube et al. A neural network model is constructed and trained with the goal of being able to accurately identify digits from handwritten photographs. For this, the Tensor Flow syntax was employed, using Keras as the front end. The trained model can take an image of a handwritten digit as input and predict the digit's class, that is, it can predict the digit or the input picture's class. Machine vision improvements, in combination with a camera and artificial intelligence programming, may now be used by PCs to recognize images.
{"title":"Object Detection using TensorFlow","authors":"yellamma pachipala, M. Harika, B. Aakanksha, M. Kavitha","doi":"10.1109/ICEARS53579.2022.9752263","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752263","url":null,"abstract":"Objects in the home that are often used tend to follow specific patterns in terms of time and location. Analyzing these trends can help us keep track of our belongings and increase efficiency by reducing the amount of time wasted forgetting or looking for them. Tensor Flow, a relatively new framework from Google, was utilised to model our neural network in our project. Multiple objects in real-time video streams are detected using the Tensor Flow Object Detection API. The system then detects trends and alerts the user if an abnormality is discovered. Finding REMO—detecting relative mobility patterns in geographic lifelines is a study reported by Laube et al. A neural network model is constructed and trained with the goal of being able to accurately identify digits from handwritten photographs. For this, the Tensor Flow syntax was employed, using Keras as the front end. The trained model can take an image of a handwritten digit as input and predict the digit's class, that is, it can predict the digit or the input picture's class. Machine vision improvements, in combination with a camera and artificial intelligence programming, may now be used by PCs to recognize images.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132345427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9751998
R. Vijaya Saraswathi, Sk Iftequar Ahmed, M. Sriveda Reddy, S. Akshay, M. Vrushik Reddy, M. Sanjana Reddy
More and more publicly available servers are becoming vulnerable to unauthenticated and unauthorized accesses, and intrusions are becoming much more common. As the size and number of networks and the Internet traffic expands, the requirement for intrusion detection grows, as does the need to reduce the burden associated with intrusion detection. Not only is it vital for a network/server administrator to ensure client performance, but it is also important to prevent unwanted access. The rise in the number of network threats is becoming a serious concern and detecting them is becoming increasingly more difficult. And the demand for a more advanced and logical intrusion detection system is growing at a rapid pace. The high rate of false/fake alarms is a fundamental flaw in existing systems. Honeypots can be a good way to improve the network’s overall dependability and security in this situation. Therefore, a self-improving approach towards security of the organizations can greatly help in tackling this kind of unauthorized accesses and data breaches. By the term self-improving, it means all the fixes are incorporated for the latest vulnerabilities found by using the attacker’s knowledge
{"title":"An Improved Approach towards Network Security of an Organization","authors":"R. Vijaya Saraswathi, Sk Iftequar Ahmed, M. Sriveda Reddy, S. Akshay, M. Vrushik Reddy, M. Sanjana Reddy","doi":"10.1109/ICEARS53579.2022.9751998","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9751998","url":null,"abstract":"More and more publicly available servers are becoming vulnerable to unauthenticated and unauthorized accesses, and intrusions are becoming much more common. As the size and number of networks and the Internet traffic expands, the requirement for intrusion detection grows, as does the need to reduce the burden associated with intrusion detection. Not only is it vital for a network/server administrator to ensure client performance, but it is also important to prevent unwanted access. The rise in the number of network threats is becoming a serious concern and detecting them is becoming increasingly more difficult. And the demand for a more advanced and logical intrusion detection system is growing at a rapid pace. The high rate of false/fake alarms is a fundamental flaw in existing systems. Honeypots can be a good way to improve the network’s overall dependability and security in this situation. Therefore, a self-improving approach towards security of the organizations can greatly help in tackling this kind of unauthorized accesses and data breaches. By the term self-improving, it means all the fixes are incorporated for the latest vulnerabilities found by using the attacker’s knowledge","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752183
I. Chandra, Mohana Sundari L, N. Ashok Kumar, Ngangbam Phalguni Singh, Joshuva Arockia Dhanraj
Internet speeds and technological advancements have made individuals increasingly concerned about their personal information being compromised by criminals. There have been a slew of new steganography and data concealment methods suggested in recent years. Steganography is the art of hiding information in plain sight (text, audio, image and video). Unauthorized users now have access to steganographic analysis software, which may be used to retrieve the carrier files valuable secret information. Unfortunately, because to their inefficiency and lack of security, certain steganography techniques are readily detectable by steganalytical detectors. We present a video steganography technique based on the linear block coding concept that is safe and secure. Data is protected using a binary graphic logo but also nine uncompressed video sequences as cover data and a secret message. It's possible to enhance the security by rearranging pixels randomly in both the cover movies and the hidden message. Once the secret message has been encoded using the Hamming algorithm (7, 4) before being embedded, the message is even more secure. The XOR function will be used to add the encoded message's result to a random set of values. Once the message has been sufficiently secured, it may be inserted into the video frames of the cover. In addition, each frame's embedding region is chosen at random so that the steganography scheme's resilience can be improved. In addition, our experiments have shown that the approach has a high embedding efficiency. The video quality of stego movies is quite close to the original, with a PSNR (Pick Signal to Noise Ratio) over 51 dB. Embedding a payload of up to 90 Kbits per frame is also permissible, as long as the quality of the stego video is not noticeably degraded.
{"title":"A Logical Data Security Establishment over Wireless Communications using Media based Steganographic Scheme","authors":"I. Chandra, Mohana Sundari L, N. Ashok Kumar, Ngangbam Phalguni Singh, Joshuva Arockia Dhanraj","doi":"10.1109/ICEARS53579.2022.9752183","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752183","url":null,"abstract":"Internet speeds and technological advancements have made individuals increasingly concerned about their personal information being compromised by criminals. There have been a slew of new steganography and data concealment methods suggested in recent years. Steganography is the art of hiding information in plain sight (text, audio, image and video). Unauthorized users now have access to steganographic analysis software, which may be used to retrieve the carrier files valuable secret information. Unfortunately, because to their inefficiency and lack of security, certain steganography techniques are readily detectable by steganalytical detectors. We present a video steganography technique based on the linear block coding concept that is safe and secure. Data is protected using a binary graphic logo but also nine uncompressed video sequences as cover data and a secret message. It's possible to enhance the security by rearranging pixels randomly in both the cover movies and the hidden message. Once the secret message has been encoded using the Hamming algorithm (7, 4) before being embedded, the message is even more secure. The XOR function will be used to add the encoded message's result to a random set of values. Once the message has been sufficiently secured, it may be inserted into the video frames of the cover. In addition, each frame's embedding region is chosen at random so that the steganography scheme's resilience can be improved. In addition, our experiments have shown that the approach has a high embedding efficiency. The video quality of stego movies is quite close to the original, with a PSNR (Pick Signal to Noise Ratio) over 51 dB. Embedding a payload of up to 90 Kbits per frame is also permissible, as long as the quality of the stego video is not noticeably degraded.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115563583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752391
A. Latha, S. Murugeswaran, G. Yamuna
Ternary Logic Circuits have gained the crucial attention of all the semiconductor researchers as it provides better interconnect, power, performance and speed when compared to the conventional binary logics. There is a minimal area overhead in ternary logics but that’s permissible as long as other parameters provide a much beneficial results. Carbon Nano Tube (CNT) Transistors are a remarkable replacement for the conventional Complementary Metal Oxide Semiconductors (CMOS) as they exhibit better electrical connectivity, structural abilities and mechanical properties. The main focus of present-day requirements are designing and developing power optimized high speed circuits without compromising on performance and area. So, to achieve all these, this research work focus on combining both the high-profile techniques to build Low Powered Ternary Arithmetic Logic Circuits (LP- TALCs) using CNT transistors. ALCs plays the major role as the basic operating unit for any processors or circuits which helps to perform arithmetic operations and logic operations in single structure. The various logic operations performed by this TALC circuit is Buffer, Inversion, Ternary NAND, Ternary NOR, Ternary AND, Ternary OR, Ternary Adder, Ternary Subtractor and Ternary Comparator. The structure basically consists of Low Power Enabled Decoder (LPED), Functional modules and Output selection circuit (OSC). LPED circuit helps to achieve low power by enabling the selected circuit operations using decoder circuits and the inputs are fed to functional modules which consists of all the logical structure and finally the output selection circuit consists of encoders which deliver the final output function. The proposed structure is designed using 32nm CNTFET technology and the simulation results shows almost 90% power reduction to their binary counterpart and 85% Power delay product improvement.
{"title":"Power Optimized Ternary Arithmetic Logic Circuit using Carbon Nano Tube Field Effect Transistor","authors":"A. Latha, S. Murugeswaran, G. Yamuna","doi":"10.1109/ICEARS53579.2022.9752391","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752391","url":null,"abstract":"Ternary Logic Circuits have gained the crucial attention of all the semiconductor researchers as it provides better interconnect, power, performance and speed when compared to the conventional binary logics. There is a minimal area overhead in ternary logics but that’s permissible as long as other parameters provide a much beneficial results. Carbon Nano Tube (CNT) Transistors are a remarkable replacement for the conventional Complementary Metal Oxide Semiconductors (CMOS) as they exhibit better electrical connectivity, structural abilities and mechanical properties. The main focus of present-day requirements are designing and developing power optimized high speed circuits without compromising on performance and area. So, to achieve all these, this research work focus on combining both the high-profile techniques to build Low Powered Ternary Arithmetic Logic Circuits (LP- TALCs) using CNT transistors. ALCs plays the major role as the basic operating unit for any processors or circuits which helps to perform arithmetic operations and logic operations in single structure. The various logic operations performed by this TALC circuit is Buffer, Inversion, Ternary NAND, Ternary NOR, Ternary AND, Ternary OR, Ternary Adder, Ternary Subtractor and Ternary Comparator. The structure basically consists of Low Power Enabled Decoder (LPED), Functional modules and Output selection circuit (OSC). LPED circuit helps to achieve low power by enabling the selected circuit operations using decoder circuits and the inputs are fed to functional modules which consists of all the logical structure and finally the output selection circuit consists of encoders which deliver the final output function. The proposed structure is designed using 32nm CNTFET technology and the simulation results shows almost 90% power reduction to their binary counterpart and 85% Power delay product improvement.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115899001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752269
J. Swarup Kumar, D. Indira, K. Srinivas, M. N. Satish Kumar
Every person's primary source of nutrition comes from milk. Adulterants should not be found in milk that is of high quality. In most cases, local shopkeepers and supermarket shops alike sell milk. Nevertheless, the local milk merchants utilise a slew of adulterants in their product, changing the composition of milk forever. The usage of degraded milk can lead to major health problems. The milk must therefore be tested for the presence of necessary parameters and any adulterants that have been added to it in order to ensure the quality of the milk. Here, sensors are employed to estimate several factors, such as pH, turbidity and colour. Similarly, the milk sector should be able to transmit the administration continuous data on milk quality during the production of milk bundles using the Neural Network model to help combat illegal items like poor milk quality.
{"title":"Quality Assessment and Grading of Milk using Sensors and Neural Networks","authors":"J. Swarup Kumar, D. Indira, K. Srinivas, M. N. Satish Kumar","doi":"10.1109/ICEARS53579.2022.9752269","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752269","url":null,"abstract":"Every person's primary source of nutrition comes from milk. Adulterants should not be found in milk that is of high quality. In most cases, local shopkeepers and supermarket shops alike sell milk. Nevertheless, the local milk merchants utilise a slew of adulterants in their product, changing the composition of milk forever. The usage of degraded milk can lead to major health problems. The milk must therefore be tested for the presence of necessary parameters and any adulterants that have been added to it in order to ensure the quality of the milk. Here, sensors are employed to estimate several factors, such as pH, turbidity and colour. Similarly, the milk sector should be able to transmit the administration continuous data on milk quality during the production of milk bundles using the Neural Network model to help combat illegal items like poor milk quality.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-16DOI: 10.1109/ICEARS53579.2022.9752093
N. Bodapati, Ala Divya, N. Triveni, Narahari Indiradevi, Koppuravuri Yamini
The brain may be the most important organ in the human body. Memory, vision, hearing, and other senses are all under its control, as are personality traits and the ability to judge one's own strengths and weaknesses. There are many different types of tumors, some of which can lead to cancerous growths in the brain. Tumors are most commonly caused by the stalled growth of brain cells. With the aid of automatic tumor detection algorithms using Magnetic Resonance Imaging, the most deadly brain tumor can be diagnosed quickly and accurately. Radiation imaging provides detailed information on human tissue, which aids in tumor diagnosis. The clinical device's ability to determine a tumor's location relies heavily on accurate segmentation of the Magnetic Resonance Image picture. An Magnetic Resonance Imaging scan is used to examine the patient's medical status. The goal of this work is to devise the best method for detecting tumors on brain Magnetic Resonance Imaging scans and, if that proves to be the case, to determine whether the neoplasm is benign or malignant. Once these systems are applied to Magnetic Resonance images, it takes no time at all to make a neoplasm prediction, and the subsequent accuracy makes treating patients much easier. The radiologist can make quick decisions with the help of these predictions. K-means clustering method is then used to divide the brain into distinct tissues.. This method shows promise in the classification of a variety of disorders using a certain style of Magnetic Resonance images.
{"title":"Brain Tumor Detection On MR Images Using Improved Support Vector Machine","authors":"N. Bodapati, Ala Divya, N. Triveni, Narahari Indiradevi, Koppuravuri Yamini","doi":"10.1109/ICEARS53579.2022.9752093","DOIUrl":"https://doi.org/10.1109/ICEARS53579.2022.9752093","url":null,"abstract":"The brain may be the most important organ in the human body. Memory, vision, hearing, and other senses are all under its control, as are personality traits and the ability to judge one's own strengths and weaknesses. There are many different types of tumors, some of which can lead to cancerous growths in the brain. Tumors are most commonly caused by the stalled growth of brain cells. With the aid of automatic tumor detection algorithms using Magnetic Resonance Imaging, the most deadly brain tumor can be diagnosed quickly and accurately. Radiation imaging provides detailed information on human tissue, which aids in tumor diagnosis. The clinical device's ability to determine a tumor's location relies heavily on accurate segmentation of the Magnetic Resonance Image picture. An Magnetic Resonance Imaging scan is used to examine the patient's medical status. The goal of this work is to devise the best method for detecting tumors on brain Magnetic Resonance Imaging scans and, if that proves to be the case, to determine whether the neoplasm is benign or malignant. Once these systems are applied to Magnetic Resonance images, it takes no time at all to make a neoplasm prediction, and the subsequent accuracy makes treating patients much easier. The radiologist can make quick decisions with the help of these predictions. K-means clustering method is then used to divide the brain into distinct tissues.. This method shows promise in the classification of a variety of disorders using a certain style of Magnetic Resonance images.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115600789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}