{"title":"Comparative Analysis of Reconfigurable Low Pass Filter using Biquad Active, Ladder Gm-C and Multiple Loop Feedback Techniques","authors":"Nupur Mittal, Imran Khan, S. Shukla","doi":"10.1109/SMART50582.2020.9336804","DOIUrl":"https://doi.org/10.1109/SMART50582.2020.9336804","url":null,"abstract":"An important concern for LPF with switchable attributes at baseband is to select a appropriate filter structure. Among the different approaches three approaches are prominently used named LC ladder simulation biquad cascade and multiple loop feedback (MLF). This study aimed at comparative analysis of three different low pass filter approaches. The filters are realized using Biquad Technique, ladder technique and MLF approach. Simulations are done using different CMOS technology. In this paper a comparison is made using different parameters. In general, the results prove that a good agreement between all the three approaches usng SPICE simulations.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review Paper on Data Security in Cloud Computing Environment","authors":"B. Shirole, L. Vishwamitra","doi":"10.1109/SMART50582.2020.9337115","DOIUrl":"https://doi.org/10.1109/SMART50582.2020.9337115","url":null,"abstract":"In today's scenario cloud computing in growing concept in the computer and information technology field for storing the data. Because on the physical storage device whatever the huge amount of data which is sensitive or confidential that cannot be stored. So the cloud computing comes into the picture for storing the data as per their requirement. But if we store the data on cloud it will be easily accessible to all and the confidentiality of that data is not maintained. So for that purpose we are going make the data on the cloud to be secure with the help of cryptography. In this Paper we talk about earlier work in this field of encryption algorithm and the key issues for encrypting the data and decoding the data in cloud environment and proposed the objectives for improving the encryption algorithm and key issues which would help to store the data in cloud environment securely and efficiently. The paper proposed the defined objectives for the secrecy of the data in the storage of cloud computing environment which is the main aspect of our paper.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126835464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flaws and Amendment in an ECC-based Authentication Scheme for SIP","authors":"M. Gupta, Rahul Kumar, S. Kumari","doi":"10.1109/SMART50582.2020.9336790","DOIUrl":"https://doi.org/10.1109/SMART50582.2020.9336790","url":null,"abstract":"In this paper, we study the pitfalls of Qiu et al.'s protocol proposed for session initiation protocol and also suggest amendment in it. We reveal that their protocol has a mistake in the mechanism of establishing the session key between the user and the server. Because of this, their protocol cannot achieve mutual authentication. The scheme also suffers from a replay attack. To recover these problems in their protocol, we propose an amended protocol to provide better security and achieve mutual authentication. The informal security analysis shows the superiority of the improved protocol over Qiu et al.'s protocol.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131003035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Augmenting Border Gateway Protocol with Multi-protocol Label Switching for Enhancing Network Path Restoration","authors":"Vidhu Baggan, P. Sarangi, D. Prasad, Jyoti Snehi","doi":"10.1109/SMART50582.2020.9337076","DOIUrl":"https://doi.org/10.1109/SMART50582.2020.9337076","url":null,"abstract":"Network routing depends primarily on connectivity, which demands the insurance from protocol standards that even if one network path disconnects, the alternate path should be available in no time with minimum packet loss. The Network Path Restoration (NPR) mechanism is required after any link/node failure occurs in a network. These failures are frequent in core networks and must be handled in a quick and efficient manner with minimum packet loss. In this paper, it is proposed that augmenting Border Gateway Protocol (BGP) with Multiprotocol Label Switching (MPLS) technology can enhance the NPR mechanism with minimum packet loss. This research work made a significant contribution to NPR. In this study, hybridization of approaches have been performed to design a new mechanism for NPR.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127750687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Agarwal, Y. Arya, Gaurav Agarwal, S. Agarwal, K. K. Gola
{"title":"A Fuzzy Based Decision Support System for Irrigation Process in Precision Agriculture","authors":"A. Agarwal, Y. Arya, Gaurav Agarwal, S. Agarwal, K. K. Gola","doi":"10.1109/SMART50582.2020.9337080","DOIUrl":"https://doi.org/10.1109/SMART50582.2020.9337080","url":null,"abstract":"Productivity level has been no doubt increased in every field, let it be agriculture. New technologies have replaced traditional work culture. But still a lot of work is left in order to perform precision agriculture, which means more production using less products or manpower. Many researchers have proposed many decision support systems to achieve this target. These automatic agricultural decision-making systems improve the decision making of farmers and also will manage and maintain the agricultural field in a better way. In this paper, we have proposed a Decision support system for the irrigation process in order to make precision agriculture. The system takes values from sensors and deals with parameters like temperature, humidity, PH value etc. We have used a fuzzy controller and implementation is performed on Matlab.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BER Analysis of Different Lattice Reduction Aided Multi User-Massive MIMO Detection Techniques","authors":"Annu Singh, S. Joshi","doi":"10.1109/SMART50582.2020.9336797","DOIUrl":"https://doi.org/10.1109/SMART50582.2020.9336797","url":null,"abstract":"The escalating demand for higher data rate and to provide service to multiple users simultaneously has increased the challenge of efficient spectrum utilization. The two important technologies required in 5G is Mmwave and Massive MIMO to use the benefit of wider bandwidth of mmwave and to mitigate interference using Massive MIMO Technology. In this paper we compare the BER (Bit Error Rate) of different LR (Lattice Reduction) aided Massive MIMO detection technique at 28GHz frequency. We use the QR decomposition as a preprocessing step in the entire MIMO detector. LRA (Lattice Reduction Aided) detectors performance-complexity tradeoff factor δ, (δ=3/4). Scattering Channel Model is used with 100 numbers of scatterers. We employ the different MIMO configuration, modulation techniques, multiple number of users, single and multiple data stream per user to compare and analyze the BER (Bit Error Rate) results. The results are analyzed for Brun's algorithm, Lenstra Lenstra Lovasz (LLL) algorithm, Complex LLL(CLLL) algorithm, Fixed Complexity LLL (fc-LLL) Algorithm, Efficient LLL(ELLL) Algorithm, Possible Swap LLL Algorithm (PSLLL), Greedy LLL algorithm, and LLL-MMSE algorithm.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Neuromarketing Techniques and Emotion Analysis Classifiers for Visual-Emotion Mining","authors":"Rupali Gill, Jaiteg Singh","doi":"10.1109/SMART50582.2020.9337074","DOIUrl":"https://doi.org/10.1109/SMART50582.2020.9337074","url":null,"abstract":"“People do well to express what they want, what they like, or how much they will pay for something. But they do not really know where that value comes from, or how and when it is influenced by such things as store demonstrations or products.” With the growing trend of studying consumer behavior, a study called neuro-marketing can be applied on previous findings related to neuroscience to get an idea of marketing strategies. To obtain feedback about a product from various e-commerce sites sentiment and opinion mining of neurons can be carried out. This helps a user to predict emotions, to extract opinions from the internet and predict customer's preferences by applying various neuromarketing techniques. The paper provides a review of various neuromarketing and emotion analysis techniques to study marketing behavior.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121686972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Need for Information Security Management for SMEs","authors":"M. I. Khan, Sarvesh Tanwar, A. Rana","doi":"10.1109/SMART50582.2020.9337108","DOIUrl":"https://doi.org/10.1109/SMART50582.2020.9337108","url":null,"abstract":"A major part of the global economic activity is now constituting small to medium sized enterprises (SMEs) and under the current business globalization scenario Information Security Management (ISM) is crucial. As the size of an organization grows along with it multiplies the amount of sensitive information the organization is storing in their databases. It has been reported that small and medium business accounts for 80-90% of the market share, but most of the ISM effort is concentrated towards large business, as they provide around 50% of the turnover. SMEs are now becoming dependent on technology to provide better and more efficient services; this is a cause of concern as not all SMEs are taking the necessary steps to ensure information security. This paper explores the limitations faced by SMEs regarding ISM and how they can overcome it.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129199549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Juxtapose of Sentiment Cognized Deep Learning Approach for Sham Percipience on Social Media","authors":"N. S. Devi, K. Sharmila","doi":"10.1109/SMART50582.2020.9337099","DOIUrl":"https://doi.org/10.1109/SMART50582.2020.9337099","url":null,"abstract":"Online news in social networks disseminate with rapidness, and the verity of such news remains to be a domain to be indagated with meticulousness. Web and the articulations on internet itself have proved to be the breeding grounds for spreading a fake news that could mislead the readers. While some may be frivolous, certain others have caused alarming vandalism in a precarious manner. Therefore, detection of fake news is becoming an inevitable process to be established, and unsheathes widespread suggestion and responsiveness from sectors where one thinks it is least expected from. The previous work apropos to this area of scrutinization had pivoted on the sentiment cognized sham percipience which as more bump on the fallacious article prediction where some of the work engrossed on the source of article and the elegance of writing the article which will not precise the fallacious of the article. However this paper focuses on the analysis of identifying and extracting the feigned features of the fabricated article, and determine the efficacious techniques used to approximate the characteristics to mitigate inter-dependability. Thus, producing bankable results that eliminate the reliance of attributes on the fallacious news. The comparison of the simulation outcomes evince that the generalized approximation of the contrived sham is notably appreciable through the sentiment cognizance deep learning methodology. The fallacious articulations are also scrutinized further using the VADER (Valence Aware Dictionary and sentiment Reasoner) tool to obtain more precise results. The simulations are carried out successfully, and the results have been obtained that lucidly depict that this process can be applied to divulge the authenticity of an article.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122537462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Prevent Road Accident using Intelligent Device","authors":"A. Suman, C. Kumar, Preetam Suman","doi":"10.1109/SMART50582.2020.9337089","DOIUrl":"https://doi.org/10.1109/SMART50582.2020.9337089","url":null,"abstract":"Transport is one of the pillars of the economy of any country: every year government and car/vehicle manufacturers spending a lot of money on road safety. But unfortunately, crashes on roads cause various problems for the government. The main factors that cause fatal crashes, grievous injuries, and deaths are of varied nature. The type of roads, the structure of ways, weather conditions, and behaviour of the driver are a few pertinent factors that are studied and relationship identified. This paper describes a device that is capable to locate crashes early. In case if a crash occurs, the device can recognize and send information to the nearest hospital and police station. There are two acoustic signals analysed, vehicle crash sound and human distress call (generated during crashes/accidents). For recognition of both the sounds, this paper describes an algorithm based on acoustic signal processing. The algorithm was tested in the lab and it is robust and the efficiency of the algorithm 94.7% to detect a collision.","PeriodicalId":129946,"journal":{"name":"2020 9th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121522439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}