Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9080002
P. Sritha, P. Geethamani
Here, a new hybrid 8-bit full adder configuration utilizing both correlative metal-oxide-semiconductor (CMOS) reason and transmission gate judgment is described. The plan was first executed for 1 bit and after that stretched out for 32 bit likewise yet in this paper, the structure was actualized for 8-bit. The circuit was executed utilizing Cadence Virtuoso tools in 45-nm technology at 1.2-V and 1.8-V. Execution parameters for example power, delay, and transistor count up of the full adder contrasted and the officially existing paper. For 1.2-V supply at 45-nm technology, the normal power utilization 31.523nW was observed to be amazingly low with low defer 9.995ns resultant as of the predetermined inclusion of very frail CMOS inverters combined with well-built transmission gates designed for 1-bit. The plan was additionally stretched out for actualizing 8-bit full adder at 1.2-V (1.8-V) along with experimental towards only 241.0nW (556.1nW) power and −1.747ps (9.217ps) delay at 45-nm technology. Proposed full adder has been contrasted and the previously detailed circuits and the power utilization indicate better outcomes by enhancing XNOR gate.
{"title":"Eight Bit Full Adder Design Using Fifteen Transistors With Novel Five Transistors XNOR Gate","authors":"P. Sritha, P. Geethamani","doi":"10.1109/ICACCE46606.2019.9080002","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080002","url":null,"abstract":"Here, a new hybrid 8-bit full adder configuration utilizing both correlative metal-oxide-semiconductor (CMOS) reason and transmission gate judgment is described. The plan was first executed for 1 bit and after that stretched out for 32 bit likewise yet in this paper, the structure was actualized for 8-bit. The circuit was executed utilizing Cadence Virtuoso tools in 45-nm technology at 1.2-V and 1.8-V. Execution parameters for example power, delay, and transistor count up of the full adder contrasted and the officially existing paper. For 1.2-V supply at 45-nm technology, the normal power utilization 31.523nW was observed to be amazingly low with low defer 9.995ns resultant as of the predetermined inclusion of very frail CMOS inverters combined with well-built transmission gates designed for 1-bit. The plan was additionally stretched out for actualizing 8-bit full adder at 1.2-V (1.8-V) along with experimental towards only 241.0nW (556.1nW) power and −1.747ps (9.217ps) delay at 45-nm technology. Proposed full adder has been contrasted and the previously detailed circuits and the power utilization indicate better outcomes by enhancing XNOR gate.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126303963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079981
Mounesh Marali, S. Sudarsan, Ashok Gogioneni
Industrial automation and control systems are increasingly based on open communication protocols and platforms that are also commonly used in corporate IT environments and interconnected to enable integration with business applications, they become increasingly exposed to the internet. As seen in the past with WannaCry and NotPetya, it's more likely common malware will cause the most damage in the long run. These threats are expected to increase simply since the fundamental gaps in protecting the operational technology (OT) over information technology (IT) widening. As OT becomes increasingly exposed to internet, it tends to become weak spot to cyber threats as any other connected systems. This is basically because of OT components aligned on the same hardware, software, communication protocols including operating systems that run IT components, such as networks, client, server machines & other connected devices. At the same time, reusable development and deployment of interconnected systems and their communication networks become vulnerable to cyber-attacks. This paper explores cyber security issues in industrial control systems that are built on open communication platforms and networks. Specially emphasized on attacker's objectives, electronics methods and possible countermeasures for IT systems. The paper also describes various OT security-relevant characteristics distinct from the office IT systems and relevant implementation approaches at multiple system layers to protect from cyber-attacks. Finally, paper illustrates few application level security concepts with case studies focusing configuration and operation of industrial process control system.
{"title":"Cyber security threats in industrial control systems and protection","authors":"Mounesh Marali, S. Sudarsan, Ashok Gogioneni","doi":"10.1109/ICACCE46606.2019.9079981","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079981","url":null,"abstract":"Industrial automation and control systems are increasingly based on open communication protocols and platforms that are also commonly used in corporate IT environments and interconnected to enable integration with business applications, they become increasingly exposed to the internet. As seen in the past with WannaCry and NotPetya, it's more likely common malware will cause the most damage in the long run. These threats are expected to increase simply since the fundamental gaps in protecting the operational technology (OT) over information technology (IT) widening. As OT becomes increasingly exposed to internet, it tends to become weak spot to cyber threats as any other connected systems. This is basically because of OT components aligned on the same hardware, software, communication protocols including operating systems that run IT components, such as networks, client, server machines & other connected devices. At the same time, reusable development and deployment of interconnected systems and their communication networks become vulnerable to cyber-attacks. This paper explores cyber security issues in industrial control systems that are built on open communication platforms and networks. Specially emphasized on attacker's objectives, electronics methods and possible countermeasures for IT systems. The paper also describes various OT security-relevant characteristics distinct from the office IT systems and relevant implementation approaches at multiple system layers to protect from cyber-attacks. Finally, paper illustrates few application level security concepts with case studies focusing configuration and operation of industrial process control system.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115812046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079984
M. Das, P. Arjun, A. Bhaskaran, P. S. Aravind, T. Aswin, Viswas Sadasivan
This paper presents an estimate of underwater optical communication (UWOC) range, using PIN and avalanche photodetectors (APDs). In this simulation-based study, the maximum range while transmitting high-quality video at 6Mbps speed is estimated as 520m in Pure Sea water, 65m in Clear Ocean and 44m in Coastal waters, when using a 100mW laser and APD. The channel here is modeled to include the effect of attenuation and noise. This work quantifies the benefits of using an adaptive system where the wavelength (blue, blue-green and green) of transmission and modulation scheme is changed based on water transmission. Wavelength adaptation according to varying water transmission was found to provide 16 to 40dB advantage in SNR, compared to a system with fixed wavelength, in different waters. A recommendation for wavelength adaptable transmitter design is made based on this. This study assumes the current state of the art in commercially available components.
{"title":"Estimation of maximum range for underwater optical communication using PIN and avalanche photodetectors","authors":"M. Das, P. Arjun, A. Bhaskaran, P. S. Aravind, T. Aswin, Viswas Sadasivan","doi":"10.1109/ICACCE46606.2019.9079984","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079984","url":null,"abstract":"This paper presents an estimate of underwater optical communication (UWOC) range, using PIN and avalanche photodetectors (APDs). In this simulation-based study, the maximum range while transmitting high-quality video at 6Mbps speed is estimated as 520m in Pure Sea water, 65m in Clear Ocean and 44m in Coastal waters, when using a 100mW laser and APD. The channel here is modeled to include the effect of attenuation and noise. This work quantifies the benefits of using an adaptive system where the wavelength (blue, blue-green and green) of transmission and modulation scheme is changed based on water transmission. Wavelength adaptation according to varying water transmission was found to provide 16 to 40dB advantage in SNR, compared to a system with fixed wavelength, in different waters. A recommendation for wavelength adaptable transmitter design is made based on this. This study assumes the current state of the art in commercially available components.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079970
K. Ali, P. Sampath, C. Poongodi
Cooperative communications technique receive a lot of interest, to combat frequency selectivity fading of wireless channels. Cooperative protocols are used to increase the total capacity, Signal to Noise Ratio (SNR) and reduced the Symbol Error Rate (SER) in wireless communication systems. The performance of Particle Swarm Optimization (PSO) based Power Allocation (PA) for Proposed Hybrid Decode and Forward (DF)/Amplify and Forward (AF) Relaying Protocol using Maximal Ratio Combining (MRC) technique with Mary-Phase Shift Keying (M-PSK) Modulation over Rayleigh fading and Rician fading is presented in this paper. The results are compared with exiting AF and DF relaying protocols. Hybrid DF/AF Relaying Protocol achieves reduced SER compared to the existing AF and DF relaying protocol.
{"title":"Symbol Error Rate Performance of Hybrid DF/AF Relaying Protocol Using Particle Swarm Optimization Based Power Allocation","authors":"K. Ali, P. Sampath, C. Poongodi","doi":"10.1109/ICACCE46606.2019.9079970","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079970","url":null,"abstract":"Cooperative communications technique receive a lot of interest, to combat frequency selectivity fading of wireless channels. Cooperative protocols are used to increase the total capacity, Signal to Noise Ratio (SNR) and reduced the Symbol Error Rate (SER) in wireless communication systems. The performance of Particle Swarm Optimization (PSO) based Power Allocation (PA) for Proposed Hybrid Decode and Forward (DF)/Amplify and Forward (AF) Relaying Protocol using Maximal Ratio Combining (MRC) technique with Mary-Phase Shift Keying (M-PSK) Modulation over Rayleigh fading and Rician fading is presented in this paper. The results are compared with exiting AF and DF relaying protocols. Hybrid DF/AF Relaying Protocol achieves reduced SER compared to the existing AF and DF relaying protocol.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121891832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079997
P. Bhargavi, Alan Joy, T. Sukumara, U. Eranna
With the advent of VLSI, complex circuits can be implemented on a small single chip leading to the development of embedded devices that perform dedicated functions most commonly deployed as Cyber Physical System (CPS) today. Security of real-time cyber physical systems is of great concern these days as attacking a single device in a network may cause all the devices in the network to be affected and the result of attack may be severe as these devices may need to respond in real time. Most of the CPS are built with USB ports which are extensively used for connectivity. It is possible for a proximate attacker to exploit the vulnerabilities in the devices through USB ports. Since merely powering-on a system and connecting a USB device provides it with access to kernel, the security of the device is at stake. For the real time cyber physical systems providing critical functionality, even a typical reboot may be of concern depending on its functionality. Hence these devices are to be thoroughly tested against any vulnerabilities and necessary measures are taken at initial stages of development. This paper covers experiences with fuzzing implemented using both Facedancer21 and umap tool and exploiting the driver vulnerability with invalid endpoint number using Facedancer21. The drivers that are vulnerable were disabled in the target host and the experiment was repeated and the target was found to be resistant to the attacks as the drivers responsible for the system crash were not loading during the enumeration process, thus securing the USB ports.
{"title":"Securing USB ports of real-time Cyber Physical Systems","authors":"P. Bhargavi, Alan Joy, T. Sukumara, U. Eranna","doi":"10.1109/ICACCE46606.2019.9079997","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079997","url":null,"abstract":"With the advent of VLSI, complex circuits can be implemented on a small single chip leading to the development of embedded devices that perform dedicated functions most commonly deployed as Cyber Physical System (CPS) today. Security of real-time cyber physical systems is of great concern these days as attacking a single device in a network may cause all the devices in the network to be affected and the result of attack may be severe as these devices may need to respond in real time. Most of the CPS are built with USB ports which are extensively used for connectivity. It is possible for a proximate attacker to exploit the vulnerabilities in the devices through USB ports. Since merely powering-on a system and connecting a USB device provides it with access to kernel, the security of the device is at stake. For the real time cyber physical systems providing critical functionality, even a typical reboot may be of concern depending on its functionality. Hence these devices are to be thoroughly tested against any vulnerabilities and necessary measures are taken at initial stages of development. This paper covers experiences with fuzzing implemented using both Facedancer21 and umap tool and exploiting the driver vulnerability with invalid endpoint number using Facedancer21. The drivers that are vulnerable were disabled in the target host and the experiment was repeated and the target was found to be resistant to the attacks as the drivers responsible for the system crash were not loading during the enumeration process, thus securing the USB ports.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079961
R. Nagananthini, G. Nithya, S. Bhuvanesh
In this paper, the methodologies and worldwide impact of the net meter are discussed with the points to be considered in positioning the solar panel for maximizing the self-consumption. In addition, the net metering policies associated with its financial factors are discussed. The depletion of fossil fuels drags the world to the paramount use of available renewable energy sources for power production in small and medium scales. In this, the power production using solar energy is playing a vital role as it is safe and pollution free. The solar PV system has made a good impact in different countries and it's fast-paced in the last two decades because of the increase in demand for electric power. Apart from the utility service to generate power by Solar PV power plants in large scale, this idea has been an attraction to the peoples and results in implementing the Solar PV in their building roofs to generate their own power in small scale. The rooftop solar PV systems made the consumers to support their residential load during the power failure, consuming less power from the grid and in advance, it can feed the excess power to the grid. By delivering the power to the grid the consumer becomes prosumer and experience economic return equal to the power delivered to the grid. Bidirectional net energy meters are useful for the consumers to keep in track of the amount of power that is transmitted to the grid (Solar power generated in excess) and received by the consumer (power received from the utility center). The main outcome of this net metering from the consumer side is the reduced total tariff when they fed the excess power to the grid.-Researches are being developed in the area of minimizing the losses, and maximum consumption with low cost affordable to build Zero Energy Buildings. In some parts of the USA, the government has come forward for free installation of the rooftop solar PV system in their people's house as awareness and receiving their excess power at a considerable rate. Without this Net metering technology, the utility cannot consume power from the consumer.
{"title":"Economic Analysis of Bi-Directional Net-meters with Orientation and Positioning of Solar Module","authors":"R. Nagananthini, G. Nithya, S. Bhuvanesh","doi":"10.1109/ICACCE46606.2019.9079961","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079961","url":null,"abstract":"In this paper, the methodologies and worldwide impact of the net meter are discussed with the points to be considered in positioning the solar panel for maximizing the self-consumption. In addition, the net metering policies associated with its financial factors are discussed. The depletion of fossil fuels drags the world to the paramount use of available renewable energy sources for power production in small and medium scales. In this, the power production using solar energy is playing a vital role as it is safe and pollution free. The solar PV system has made a good impact in different countries and it's fast-paced in the last two decades because of the increase in demand for electric power. Apart from the utility service to generate power by Solar PV power plants in large scale, this idea has been an attraction to the peoples and results in implementing the Solar PV in their building roofs to generate their own power in small scale. The rooftop solar PV systems made the consumers to support their residential load during the power failure, consuming less power from the grid and in advance, it can feed the excess power to the grid. By delivering the power to the grid the consumer becomes prosumer and experience economic return equal to the power delivered to the grid. Bidirectional net energy meters are useful for the consumers to keep in track of the amount of power that is transmitted to the grid (Solar power generated in excess) and received by the consumer (power received from the utility center). The main outcome of this net metering from the consumer side is the reduced total tariff when they fed the excess power to the grid.-Researches are being developed in the area of minimizing the losses, and maximum consumption with low cost affordable to build Zero Energy Buildings. In some parts of the USA, the government has come forward for free installation of the rooftop solar PV system in their people's house as awareness and receiving their excess power at a considerable rate. Without this Net metering technology, the utility cannot consume power from the consumer.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121554815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9080007
N. Kanthimathi, N. Saranya, V. Baranidharan
Wireless sensor networks consist of huge nodes with sensing, computing and communication capabilities. The unique quality of a routing protocol is known by its minimized energy consumption, improved QoS which also prolongs the network life time. In this paper the routing protocols are recorded into three primary categories, route discovery model, network model and data delivery model. The routing protocols that fall in the first category can be named as proactive, reactive and hybrid. The routing protocols that fall under a the subsequent category are grouped as flat, hierarchical and location based. The routing protocols belonging to the third category can be parallely classified into two categories as transceiver protocol model and accuracy protocol model. Further transceiver protocol model has sub categories like negotiation, coherent based, query based. Sub categories of accuracy protocol model are QoS based protocol and multipath based protocol. The paper also plays up the merits and performance comparison of each routing technique.
{"title":"A Survey on Energy-Efficient Routing Protocols with QoS Assurances for Wireless Sensor Networks","authors":"N. Kanthimathi, N. Saranya, V. Baranidharan","doi":"10.1109/ICACCE46606.2019.9080007","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9080007","url":null,"abstract":"Wireless sensor networks consist of huge nodes with sensing, computing and communication capabilities. The unique quality of a routing protocol is known by its minimized energy consumption, improved QoS which also prolongs the network life time. In this paper the routing protocols are recorded into three primary categories, route discovery model, network model and data delivery model. The routing protocols that fall in the first category can be named as proactive, reactive and hybrid. The routing protocols that fall under a the subsequent category are grouped as flat, hierarchical and location based. The routing protocols belonging to the third category can be parallely classified into two categories as transceiver protocol model and accuracy protocol model. Further transceiver protocol model has sub categories like negotiation, coherent based, query based. Sub categories of accuracy protocol model are QoS based protocol and multipath based protocol. The paper also plays up the merits and performance comparison of each routing technique.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122765741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modern medicine has become reliant on medical imaging. The application of computer has proved to be an emerging technique in medical imaging and medical image analysis. Each level of analysis requires an effective algorithm as well as methods in order to generate an accurate and reliable result. Different modalities, such as X-Ray, Magnetic resonance imaging (MRI), Ultrasound, Computed tomography (CT), etc. are used for both diagnoses as well as therapeutic purposes in which it provides as much information about the patient as possible. Medical image processing includes image fusion, matching or warping which is the task of image registration. Medical image analysis includes Image enhancement, segmentation, quantification, registration, which is the most predominant ways to analyze the image. There are various difficulties in medical image processing and subsequent stages like image enhancement and its restoration; segmentation of features; registration and fusion of multimodality images; classification of medical images; image features measurement and analysis and assessment of measurement and development of integrated medical imaging systems for the medical field. In this paper, the techniques used in medical image analysis have been reviewed and discussed extensively. The vital goal of this review is to identify the current state of the art of medical image analysis methods as a reference paradigm in order to accelerate the performance of existing methods.
{"title":"A Comprehensive Study of Medical Image Analysis","authors":"Gitanjali Ganpatrao Nikam, Shuchi Singh, Priya Singh, Radhika Sarraf","doi":"10.1109/ICACCE46606.2019.9079996","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079996","url":null,"abstract":"Modern medicine has become reliant on medical imaging. The application of computer has proved to be an emerging technique in medical imaging and medical image analysis. Each level of analysis requires an effective algorithm as well as methods in order to generate an accurate and reliable result. Different modalities, such as X-Ray, Magnetic resonance imaging (MRI), Ultrasound, Computed tomography (CT), etc. are used for both diagnoses as well as therapeutic purposes in which it provides as much information about the patient as possible. Medical image processing includes image fusion, matching or warping which is the task of image registration. Medical image analysis includes Image enhancement, segmentation, quantification, registration, which is the most predominant ways to analyze the image. There are various difficulties in medical image processing and subsequent stages like image enhancement and its restoration; segmentation of features; registration and fusion of multimodality images; classification of medical images; image features measurement and analysis and assessment of measurement and development of integrated medical imaging systems for the medical field. In this paper, the techniques used in medical image analysis have been reviewed and discussed extensively. The vital goal of this review is to identify the current state of the art of medical image analysis methods as a reference paradigm in order to accelerate the performance of existing methods.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133643661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079980
A. Bharathi, S. Prakash
The precise prediction of the day to day and monthly transactions is of great value for companies. This information can be beneficial for the companies in analyzing their ups and downs and draw other plans. Moreover, a precise prediction method can optimize the performance of a company. The branch of analytics that deals with prediction is known as predictive analytics. This paper presents the use of data analytics in analyzing the transaction dataset provided by Uber to predict the possible outcomes and the changes to be made. The histograms and heat maps drawn provide us a clear visualization of the dataset and we must predict the rest out of it.
{"title":"An approach to predict taxi-passenger demand using quantitative histogram on Uber data","authors":"A. Bharathi, S. Prakash","doi":"10.1109/ICACCE46606.2019.9079980","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079980","url":null,"abstract":"The precise prediction of the day to day and monthly transactions is of great value for companies. This information can be beneficial for the companies in analyzing their ups and downs and draw other plans. Moreover, a precise prediction method can optimize the performance of a company. The branch of analytics that deals with prediction is known as predictive analytics. This paper presents the use of data analytics in analyzing the transaction dataset provided by Uber to predict the possible outcomes and the changes to be made. The histograms and heat maps drawn provide us a clear visualization of the dataset and we must predict the rest out of it.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124722587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1109/ICACCE46606.2019.9079999
A. Raghavaraju, T. Ramakrishna, B. Madhav, T. Bhavani
CM antenna with coplanar wave guide feeding is constructed with the combination of EBG structure for the improvement of bandwidth. DGS is engraving on the ground plane to obtain the EBG features in the proposed antenna model. A complete analysis confers to reflection coefficient, VSWR, impedance radiation pattern, current distribution, gain and efficiency are presented in this work. The depicted model occupies the dimension of 50×50×1.60 mm on FR4 substrate with dielectric constant of 4.3. Aerial operating in the dual band of 1.5-3.6 GHz (GPS, LTE, Bluetooth and Wi-Fi applications) and 4.8-15 GHz (WLAN, X-Band and Satellite communication applications) with bandwidth of 2.10 and 10.20 GHz respectively. To meet gain for this is about 4.80 db and peak Efficiency additional amount of 80% are the key marks of designed model.
{"title":"A novel study on EBG structured CPW- fed CoM antenna for WiMAX, WLAN applications","authors":"A. Raghavaraju, T. Ramakrishna, B. Madhav, T. Bhavani","doi":"10.1109/ICACCE46606.2019.9079999","DOIUrl":"https://doi.org/10.1109/ICACCE46606.2019.9079999","url":null,"abstract":"CM antenna with coplanar wave guide feeding is constructed with the combination of EBG structure for the improvement of bandwidth. DGS is engraving on the ground plane to obtain the EBG features in the proposed antenna model. A complete analysis confers to reflection coefficient, VSWR, impedance radiation pattern, current distribution, gain and efficiency are presented in this work. The depicted model occupies the dimension of 50×50×1.60 mm on FR4 substrate with dielectric constant of 4.3. Aerial operating in the dual band of 1.5-3.6 GHz (GPS, LTE, Bluetooth and Wi-Fi applications) and 4.8-15 GHz (WLAN, X-Band and Satellite communication applications) with bandwidth of 2.10 and 10.20 GHz respectively. To meet gain for this is about 4.80 db and peak Efficiency additional amount of 80% are the key marks of designed model.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130183748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}