{"title":"Design and Comparison of 24-bit Three Operand Adders using Parallel Prefix method for Efficient Computations","authors":"S. Usha, M. Kanthimathi","doi":"10.4108/eetsis.5004","DOIUrl":"https://doi.org/10.4108/eetsis.5004","url":null,"abstract":"Binary Three-operand adder serves as a foundation block used within security and Pseudo Random-Bit Generator (PRBG) systems. Binary Three-operand adder was designed using Carry Save Adder but this consumes more delay. Therefore, a Parallel Prefix Adder (PPA) method can be utilized for faster operation. The canonical types of PPA result in a lesser path delay of approximately O (log2 n). These adders can be designed for 8, 16, 24 or n bits. But this work is focused on developing a 24-bit three-operand adder that takes three 24-bit binary numbers as input and generates a 24-bit sum output and a carry using five different PPA methods The proposed summing circuits are operationalized with Hardware-Description-Language (HDL) using Verilog, and then subjected to synthesis using Field -Programmable Gate- Array (FPGA) Vertex 5. On comparing the proposed adders, it shows that the delay and the size occupied are significantly less in the Sklansky PPA. These faster three-operand adders can be utilized for three-operand multiplication in image processing applications and Internet of Things (IoT) security systems.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"46 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139890222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Comparison of 24-bit Three Operand Adders using Parallel Prefix method for Efficient Computations","authors":"S. Usha, M. Kanthimathi","doi":"10.4108/eetsis.5004","DOIUrl":"https://doi.org/10.4108/eetsis.5004","url":null,"abstract":"Binary Three-operand adder serves as a foundation block used within security and Pseudo Random-Bit Generator (PRBG) systems. Binary Three-operand adder was designed using Carry Save Adder but this consumes more delay. Therefore, a Parallel Prefix Adder (PPA) method can be utilized for faster operation. The canonical types of PPA result in a lesser path delay of approximately O (log2 n). These adders can be designed for 8, 16, 24 or n bits. But this work is focused on developing a 24-bit three-operand adder that takes three 24-bit binary numbers as input and generates a 24-bit sum output and a carry using five different PPA methods The proposed summing circuits are operationalized with Hardware-Description-Language (HDL) using Verilog, and then subjected to synthesis using Field -Programmable Gate- Array (FPGA) Vertex 5. On comparing the proposed adders, it shows that the delay and the size occupied are significantly less in the Sklansky PPA. These faster three-operand adders can be utilized for three-operand multiplication in image processing applications and Internet of Things (IoT) security systems.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"32 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139830095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Balaji, S. Jeevanandham, Mani Deepak Choudhry, M. Sundarrajan, Rajesh Kumar Dhanaraj
{"title":"Data Aggregation through Hybrid Optimal Probability in Wireless Sensor Networks","authors":"S. Balaji, S. Jeevanandham, Mani Deepak Choudhry, M. Sundarrajan, Rajesh Kumar Dhanaraj","doi":"10.4108/eetsis.4996","DOIUrl":"https://doi.org/10.4108/eetsis.4996","url":null,"abstract":" \u0000INTRODUCTION: In the realm of Wireless Sensor Networks (WSN), effective data dissemination is vital for applications like traffic alerts, necessitating innovative solutions to tackle challenges such as broadcast storms. \u0000OBJECTIVES: This paper proposes a pioneering framework that leverages probabilistic data aggregation to optimize communication efficiency and minimize redundancy. \u0000METHODS: The proposed adaptable system extracts valuable insights from the knowledge base, enabling dynamic route adjustments based on application-specific criteria. Through simulations addressing bandwidth limitations and local broadcast issues, we establish a robust WSN-based traffic information system. \u0000RESULTS: By employing primal-dual decomposition, the proposed approach identifies optimal packet aggregation probabilities and durations, resulting in reduced energy consumption while meeting latency requirements. \u0000CONCLUSION: The efficacy of proposed method is demonstrated across various traffic and topology scenarios, affirming that probabilistic data aggregation effectively mitigates the local broadcast problem, ultimately leading to decreased bandwidth demands.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"63 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139830205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis Of DevOps Infrastructure Methodology and Functionality of Build Pipelines","authors":"Sandeep Rangineni, Arvind Kumar Bhardwaj","doi":"10.4108/eetsis.4977","DOIUrl":"https://doi.org/10.4108/eetsis.4977","url":null,"abstract":"The DevOps pipeline for infrastructure is a critical component in modern software development and operations practices. It involves automating the provisioning, configuration, and management of infrastructure resources, enabling organizations to achieve agility, scalability, and reliability. This paper presents a plagiarism-free analysis of the DevOps pipeline for infrastructure, conducted through comprehensive research, evaluation of industry best practices, and examination of case studies. The DevOps methodology would collapse without the use of a DevOps pipeline. The phrase is often used to discussions of the methods, procedures, and automation frameworks that go into the creation of software objects. Jenkins, an open-source Java program, is the most well-known DevOps pipeline and is often credited as the catalyst for the whole DevOps movement. Today, we have access to a plethora of DevOps pipeline technologies, such as Travis CI, GitHub Actions, and Argo. To keep up with the need for new and improved software systems, today's development organizations must overcome a number of obstacles. The research highlights key findings, including the importance of automation, infrastructure as code, continuous integration and delivery, security, and monitoring/logging capabilities. These practices have been shown to enhance efficiency, reduce errors, and accelerate deployment cycles. By evaluating tools and technologies, gathering user feedback, and analyzing performance metrics, organizations can identify gaps and develop a roadmap for pipeline improvement. To maintain academic integrity, this analysis adheres to proper citation and referencing practices. Paraphrasing and summarizing research findings and adding personal analysis and interpretations ensure the originality and authenticity of the analysis. Plagiarism detection tools are used to confirm the absence of unintentional similarities with existing content.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"262 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140481006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanket R Durgekar, Sayeed Abdul Rahman, Sharat R Naik, Sharath S Kanchan, G. Srinivasan
{"title":"A Review Paper on Design and Experience of Mobile Applications","authors":"Sanket R Durgekar, Sayeed Abdul Rahman, Sharat R Naik, Sharath S Kanchan, G. Srinivasan","doi":"10.4108/eetsis.4959","DOIUrl":"https://doi.org/10.4108/eetsis.4959","url":null,"abstract":"Development of mobile applications is becoming increasingly important as a field as a result of the proliferation of mobile devices. However, due to poor User Interface (UI) and User Experience (UX) , many apps struggle to hold the interest of their intended users. As a result, achieving user expectations is difficult for developers. Numerous facets of mobile application design and UX/UI have been examined. Yet, they often overlook critical factors such as context, user behavior, emotions, control, usability, adaptability, language, and feedback, instead favoring isolated issue-centric approaches Taking into account all of the aforementioned factors, This review gathered preferences and perceptions. These preferences offer vital information for mobile application developers and act as a useful reference. Based on the pertinent context, the method helps designers and developers to address certain UI/UX difficulties in mobile applications. The UI and UX elements that affect the interface of mobile applications are compared in this essay. Developers and designers can better comprehend crucial elements during the development process by looking at these criteria. This helps to improve the UI and UX of mobile applications, which ultimately boosts usability and user satisfaction.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"191 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140488414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jingfeng Qi, Po Wang, Xiangyi Feng, Chaoyuan Ma, Xingwang Su
{"title":"Data standards based Mine Side Data Integration Governance Platform Research and Applications","authors":"Jingfeng Qi, Po Wang, Xiangyi Feng, Chaoyuan Ma, Xingwang Su","doi":"10.4108/eetsis.4841","DOIUrl":"https://doi.org/10.4108/eetsis.4841","url":null,"abstract":"INTRODUCTION: With the advent of the mining digitalization era, the rapid growth and diversity of mine-side data make mining production management more complex. In this context, it becomes crucial to build a set of mine-side data integration and governance platforms based on data standards. The establishment of this platform aims to solve the problems of mining data fragmentation and inconsistent standards and to improve the efficiency of data management and utilization.OBJECTIVES: The purpose of this study is to construct an efficient mine-side data integration and governance platform by studying and applying data standards to address the challenges of data heterogeneity and fragmentation. Through the development of unified data standards, the Author can realize the standardized management of mining data, improve data quality, and provide more reliable support for mining production.METHODS: The study adopts a comprehensive approach. First, a comprehensive understanding of the problems and needs facing mining data management was obtained through a literature review and field research. Second, data standards applicable to mine-side data are developed to ensure that all types of data can be consistently understood and processed. Next, a data integration and governance platform based on these standards is established, and advanced data mining and artificial intelligence technologies are applied to realize automatic integration and cleaning of multi-source data.RESULTS: Through experiments, this study proved that a mine-side data integration governance platform based on data standards was successfully constructed. The platform realizes efficient integration and cleaning of data and improves the consistency and quality of data. In practical application, the platform provides more accurate data support for mining production management and achieves remarkable results.CONCLUSION: This study provides strong theoretical and practical support for the research and application of mine-side data integration and governance platforms based on data standards. Through the development of data standards, an efficient data management platform has been established, which provides practical solutions for solving mining data management challenges. In the future, the performance of the platform can be further optimized, and the updating and maintenance of data standards can be strengthened to adapt to the constant changes in the digital development of the mining industry. This research has a positive impact on promoting the construction of mining industry informatization and improving the level of production management.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"239 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140495201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Performance Prediction Method for Talent Team Building Based on Integrated ISA-BP Neural Networks","authors":"Shusheng Shen, Yansheng Deng","doi":"10.4108/eetsis.4890","DOIUrl":"https://doi.org/10.4108/eetsis.4890","url":null,"abstract":"INTRODCTION: Objective, accurate and fair development of research and effective performance prediction methodology for the construction of the talent team is the current needs of the new era of innovation and reform and development of university management, as well as the need to improve the quality of scientific research and teaching level of the talent team.OBJCTIVES: To address the problems of irrational principle of indicator selection, incomplete system and imprecise methodology in the current research on performance prediction of talent team building.METHODS:This paper proposes a talent team construction performance prediction method based on intelligent optimization algorithm improving neural network with integrated learning as the framework. First of all, through the analysis of the current talent team construction performance prediction influencing factors selection principles, analyze the talent team construction performance management process, select the talent team construction performance prediction influencing factors, and construct the talent team construction performance analysis system; then, with the integrated learning as a framework, improve the neural network through the internal search optimization algorithm to construct the talent team construction performance prediction model; finally, through the simulation experiments to analyze and verify the effectiveness and superiority of the proposed method. The effective type and superiority of the proposed method are verified.RESULTS: The results show that the proposed method satisfies the real-time requirements while improving the prediction accuracy.CONCLUSION: This paper addresses the lack of precision in forecasting the performance of the talent pipeline and the lack of a sound analytical system. \u0000 ","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"120 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139615097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of Criminal Facial Image Using Multistage Progressive V-Net for Facial Recognition by Pixel Restoration","authors":"S. S. Beulah Benslet, P. Parameswari","doi":"10.4108/eetsis.3980","DOIUrl":"https://doi.org/10.4108/eetsis.3980","url":null,"abstract":"INTRODUCTION: Criminal activity is expanding exponentially in modern society, which leads towards a great concern about security issues. Facial recognition technology (FRT) is a powerful computer-based system that increasingly being used for recognize and match faces to solve crimes and investigations.OBJECTIVES: Due to poor image clarity and noisy pixels, the detection of criminal faces tends to be inaccurate. Hence, image enhancement techniques are required to recognize criminals with better accuracy. In the proposed model, a multistage progressive V-net based image quality enhancing technique is employed to improve accuracy.METHODS: The Convolutional Neural Network (CNN) for restoring images called MPRV-Net has three stages for a difficult balance between spatial data and highly contextualized information for image restoration tasks while recovering images.RESULTS: For image restoration tasks, including denoising, deblurring, and deraining, MPRV-Net has provided considerable performance benefits on a number of datasets. The suggested network is significant as it eliminates all three types of deviations using a single architecture. The proposed model's performance is tested using performance metrics such as accuracy, precision, recall, and specificity, obtaining 94%, 96%, 93%, and 95%.CONCLUSION: Thus, the proposed Multistage Progressive V-Net model for effectively improves the criminal Facial image for detecting criminals in public places with greater accuracy.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"121 47","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139613866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment Analysis Algorithm Based on Dance Rhythmic and Melodic Features","authors":"Zhe Chen","doi":"10.4108/eetsis.4729","DOIUrl":"https://doi.org/10.4108/eetsis.4729","url":null,"abstract":"INTRODUCTION: Dance is not only able to strengthen the body but also an expression of art. It can not only express the culture of a nation or a country but also express the emotions of a country. Therefore, it is essential to utilize algorithms for the study of dance rhythm and melodic characteristics in today's world, and introduces a sentiment analysis algorithm for the study.OBJECTIVES: To disseminate our traditional dance culture, carry forward the spirit of our traditional art, enhance the creative level of our dance art, improve the current dance art in our country can not better apply the algorithm, and solve the problem that our current sentiment analysis algorithm can not be combined with art disciplines.METHODS: Use the neural network and deep learning in sentiment analysis to establish a sentiment analysis algorithm adapted; then use the sentiment analysis algorithm to calculate the in-depth filtering of the dance rhythm and melodic characteristics of the research object; finally, the heat map of the dance rhythm and melodic characteristics of the SRD is calculated according to the experiment of the algorithm.RESULTS: The core influencing factors of dance rhythm and melodic features are found to be attention mechanism and LMT through heat analysis (knowledge map); the experimental results using the sentiment analysis algorithm can be found to have a significant mediating effect on the joint enhancement of dance rhythm and melodic sense.CONCLUSION: The development of dance art not only lies in communication and integration but also combination with contemporary computer technology; using sentiment analysis algorithms can better analyze the dance rhythm and melodic characteristics; therefore, the level of algorithm application in the field of dance art should be improved.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"101 43","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedded System Technology Spillover Effects of Digital Economy and High-Quality Economic Development","authors":"Jian Gao","doi":"10.4108/eetsis.4731","DOIUrl":"https://doi.org/10.4108/eetsis.4731","url":null,"abstract":"INTRODUCTION: With the development of digital technology and computer technology, the theory of digital economy has also had far-reaching development, but at present, the digital economy is still not able to clearly define whether the digital economy is good or bad for the high-quality development of China's economy. Therefore, it is necessary to research the spillover effect of the digital economy and the high-quality development of the economy with the help of embedded system technology.OBJECTIVES: To solve the issue of the poor coupling between the digital economy and high-quality development, to raise the degree of China's digital economic development, to improve the high energy consumption in the course of China's economic high-quality development, and to improve the application level of system technology in the study of China's economic development.METHODS: The digital economy model is established using the entropy weight method; its efficiency is evaluated using embedded system technology; the spillover effect analysis of high-quality development is then conducted using the digital economy index; and lastly, the overall assessment of the spillover effect is conducted using the comprehensive evaluation results of the entropy weight method.RESULTS: Embedded system technology has a noticeable promotion effect on the development of the digital economy; although the development of the digital economy and economic high-quality development are poorly coupled, their promotion effect is more significant; embedded system technology can indirectly promote the development of economic high-quality development through the digital economy.CONCLUSION: China should vigorously develop embedded system technology to promote the application of new technology in the economy and should further standardize the market economic order to maintain the orderly development of the digital economy.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":" 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139616635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}