{"title":"Impact of Low Frequency Noise Source over Tunnel Field Effect Transistor in Nano Regime","authors":"S. Chander, Rekha Chaudhary, S. K. Sinha","doi":"10.1109/RTEICT52294.2021.9573734","DOIUrl":"https://doi.org/10.1109/RTEICT52294.2021.9573734","url":null,"abstract":"As the device shrinks in nano regime the characteristics degrades. The device characteristics depends upon so may factors associated with device internally as well as externally. In semiconductor devices noise is an important parameter in terms of device functionality in nano regime. In this paper, we discussed the impact of low frequency noise sources on Tunnel FET device. The detail discussion has been done for the random telegraph noise, and flicker noise for TFET. In nano regime with accurate selection of device dimension it is observed that the sub threshold swing can be obtained below 60mV/decade with constant low frequency noise.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128863049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of Edge Computing and Edge Devices: Key Technology in IoT and Computer Vision Applications","authors":"M. Rohith, Ajeet Sunil, Mohana","doi":"10.1109/RTEICT52294.2021.9573996","DOIUrl":"https://doi.org/10.1109/RTEICT52294.2021.9573996","url":null,"abstract":"Edge computing is a new emerging technology which focuses on finding computation power near Internet of Things (IoT) devices such as sensors, smart phones, and many more advanced devices. The process of creating, collecting and analysing real-time resources, in IoT gadgets that provide information. In case of edge analytics, the data is moved to the next step, where more data is obtained and analysed before non-delaying steps are taken. Computing in edge is known for its performance at moment or in software applications. Edge computing focuses on eliminating challenges of IoT devices such as congestion of networks, latency and data management. The area of computer vision also uses the edge computing technique. Edge computing processes the computer vision in order to reduce the cost of transmission of data. Edge computing also processes sample of video without sending it to the cloud or any other storage unit. This paper describes use of edge computing technology in IoT and computer vision applications. Construction of computers on edge and also provides insight into the most prominent key players in this domain. And types of peripheral devices, research challenges endured by researchers in IoT and Computer vision area.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129545765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparative Study of Performance Analysis of Solar PV With Interleaved DC-DC Converters","authors":"T.S Shilpashree, K. Kumar, S. Pranupa","doi":"10.1109/RTEICT52294.2021.9573809","DOIUrl":"https://doi.org/10.1109/RTEICT52294.2021.9573809","url":null,"abstract":"This paper presents the comparative study of the performance analyses of the Solar (PV) system interfaced with interleaved DC-DC converters. The mathematical model of solar PV is developed from it equivalent circuit. The output of solar PV system needs to be boosted to the required voltage level for most of the applications. This can be achieved by connecting a suitable boost converter to the solar PV system. The performance of solar PV with different types of interleaved DC-DC converters are analyzed. The analysis is carried out in terms of output voltage gain, number of switches required, duty cycle, and ripples in the output waveform and efficiency of the converter. The performance of solar PV with Improved Quadratic Boost Converter (IQBC) is presented and compared with Conventional Boost Converters (CBC) and Conventional Interleaved Boost Converter (CIBC). The MATLAB/Simulink results proves that the performance of solar PV with IQBC is superior compared to conventional converters.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129700649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Divide and Scramble - A Recursive Image Scrambling algorithm utilizing Rubik's Cube","authors":"Rahul Patanwadia, Ramchandra S. Mangrulkar","doi":"10.1109/RTEICT52294.2021.9573949","DOIUrl":"https://doi.org/10.1109/RTEICT52294.2021.9573949","url":null,"abstract":"Divide and Scramble - An image scrambling algorithm based on the Rubik's cube is presented in this paper. The strength and robustness of the algorithm are based on the number of permutations of the Rubik's cube and its simple yet chaos-inducing rotation methods. The algorithm uses a recursive approach that runs in linearithmic time. This makes the algorithm practical for real-time applications, which involve the concepts of cryptography. The algorithm begins by dividing the image into two halves and then, pixels from each half are combined to form a cube which is scrambled using the moves generated by a pseudo-random number generator function. The generated halves are further scrambled using the algorithm in a recursive manner. The scrambling algorithm is flexible enough to be paired up with any given diffusion, confusion, or substitution methods to obtain complex and secure encryption. Moreover, the pseudo-random number generator function used can also be replaced by other random number sequence generators like chaotic maps. The strength and robustness of the algorithm are backed by the obtained results from the experiments performed. Experimental results also show that the image quality is not compromised by the algorithm while resisting common crypto-attacks like differential and statistical attacks.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129735911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Sarala, Shivashankar, R. Gatti, Satyasrikanth Palle
{"title":"Isolation and Dispensing of DC-to-DC Power Supply to High Power Electrical Application Circuits","authors":"T. Sarala, Shivashankar, R. Gatti, Satyasrikanth Palle","doi":"10.1109/RTEICT52294.2021.9574011","DOIUrl":"https://doi.org/10.1109/RTEICT52294.2021.9574011","url":null,"abstract":"The suggested system is constructed using a line voltage of 220V/50Hz as input, which is stepped down, rectified, then admitted through a filter capacitor to produce an unregulated DC voltage. This uncontrolled voltage is stepped down to provide a steady 15v supply to the IC, which is controlled by a PWM signal to control the output voltage level to the various applications. To isolate the DC output from the input source, a Separation Transformer is employed. The transformer output is rectified again by the high frequency Diode bridge rectifier and filtered with a capacitor to provide the regulated DC output. To provide correct voltage output, a voltage regulator is installed. The feedback network generates a high frequency PWM signal that drives the MOSFET switch. The DC voltage at the output is determined by the width of the switching pulse. The pulse width varies in response to fluctuations in the DC output voltage level; this variation in the pulse width eliminates the output voltage variation, and the SMPS output stays constant independent of load dissimilarities","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126474443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of high speed design on a multilayer PCB substrate","authors":"C. Raghavendra Rao, Satish Tunga, A. G.","doi":"10.1109/RTEICT52294.2021.9573832","DOIUrl":"https://doi.org/10.1109/RTEICT52294.2021.9573832","url":null,"abstract":"This paper gives an overview of desirable factors that influence the circuit board designed on a printed circuit board and the characteristic of high-speed design board. Signal integrity, as the name suggests includes degradation and timing errors of digital waveforms, for example, they travel along the conductors that make up the path, such as Circuit board traces, packaging structure and connectors. These conductors represent the transmission lines. Signal integrity of the signals propagating across the board is one of the prime factors to be considered in digital circuit design as these parameters are used in electromagnetic analysis of cross talk, signal degradation, propagation delays etc. on a PCB transmission lines. Modern high-speed circuit board designs require special attention because of their short operating frequency and short rise time. So, this literature presents the most important aspects and parameters that PCB designers should consider and analyze before creating a circuit board layout. This literature also discusses on the basic high-speed PCB design guidelines and challenges occurring at the development stage of a board.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121222050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memory Leak Detection Tools: A Comparative Analysis","authors":"Dilip Kumar Gangwar, Avita Katal","doi":"10.1109/RTEICT52294.2021.9574012","DOIUrl":"https://doi.org/10.1109/RTEICT52294.2021.9574012","url":null,"abstract":"Memory leak is a situation when the memory taken up by dynamically allocated objects is not deallocated after its use. Memory leak is a serious problem in embedded systems as they are memory constrained devices. This can also be a serious problem in servers as continuous leaking of memory space results in denial of client requests in due time. The programmer has to take care while writing the code of the application for such main memory related issues. Apart from manual inspection of the code for memory leak, finding illegal memory issues can be tedious sometimes. Various tools are available in order to detect main memory related issues in the software which can ease the testing time of application. These tools are categorized as static and dynamic analysis tools. These tools help programmers to write memory safe and clean code without going into memory leak and related issues. This paper discusses different memory leakage detection tools. The paper also provides the comparison of different tools on the basis of different parameters and concludes with the evaluation of the memory detection tools on the basis of time taken. The results show that Mtrace tool takes maximum time for analysis and Electric fence tools takes minimum time for analysis.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121289036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of aspect Based Sentiment Analysis of Hotel Reviews","authors":"H.S Lakmisagar, M. Sumathi","doi":"10.1109/RTEICT52294.2021.9573897","DOIUrl":"https://doi.org/10.1109/RTEICT52294.2021.9573897","url":null,"abstract":"Over the past 2 years, in India, a significant rise in the number of people having access to the internet has been observed. Owing to its extensive fame, there is a huge quantity of user reviews or thoughts produced and shared every day. In this project hotel and product reviews will be collected, pre-processed, scrutinized and visualized using open-source tools to achieve text mining and sentiment analysis for examining user contributed online reviews. Collecting customer opinions manually using conventional methods such as surveys can be expensive, cumbersome and time consuming and a lot of constraints will come into picture. Which is why it is used text mining from online websites. The sentiment analysis of customer opinions will assist industries in appreciating their competitive worth in a changing market and understanding their clients' opinions about their products and services, which will also provide a vision into future promotion strategies and real-time decision making policies.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122640360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System-on-Chip Security Validation and Recent Trends","authors":"R. V. Navysshree, S. Yadav","doi":"10.1109/RTEICT52294.2021.9573992","DOIUrl":"https://doi.org/10.1109/RTEICT52294.2021.9573992","url":null,"abstract":"System-on-Chip (SoC) technology is an integral part of every modern computing device today. Needless to say, SoC driven gadgets store and manage several, if not all of our sensitive intellectual assets, be it in our personal, financial and/or intimate physiological information domain. In this age where data is just a mere click away, Privacy and Data Security is of paramount importance and the need to address this has quickly percolated to the Hardware realm as well. Owing to fast-paced-development models and proliferation of the Electronics industry, Sub - contracting and purchasing third parties for their hardware Intellectual Property (IP) is turn into a ubiquitous exercise for its ease and economic benefits. However, this significantly has increased the risk of introducing security vulnerabilities such as hardware Trojans and other malicious components into the system through these third-party IPs. As a result, Security Validation for hardware systems has recently gained an elevated status in the Hardware System design and development lifecycle. The primary objective of this paper is to research and investigate various Security Validation Methods, the current challenges and gaps observed in the existing systems that were embraced in the hope of strengthening Security.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122687678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Improvement of Navic Signal Using Real-time Filtering Techniques","authors":"A. Rakshitha, K. R. Shobha, P. Parimala","doi":"10.1109/RTEICT52294.2021.9573745","DOIUrl":"https://doi.org/10.1109/RTEICT52294.2021.9573745","url":null,"abstract":"The Indian Regional Navigational Satellite System [IRNSS] is India's own indigenous navigation system. Its purpose is to offer precise positional information to users in India as well as the surrounding region, which extends up to 1500 kilometers outside the country's borders. Satellite geometry, signal reception delays induced by the ionosphere and troposphere, multipath doppler effect produced by relative motion clock drift, and receiver noise all affect the positioning accuracy of a satellite-based navigation system. The ionosphere's influence surpasses all the preceding factors since even a slight delay in the signal has a significant impact on the user's position. Different methods, such as dual frequency methods, differential correction approaches, and various single frequency ion delay models, are used to alleviate ionosphere delays. In the proposed work Kalman filter is applied to correct the positioning errors [1]. The suggested method's performance in an urban setting is examined using real-time data obtained by a Global Navigation Satellite System (GNSS) receiver. Both static and dynamic data is used to analyse the performance of the proposed method. In the position domain the results are evaluated using the parameters - Percentage Fit Error and Mean Absolute Error [2]. The lost path during reception is regenerated using linear interpolation function. The simulation results obtained show that the proposed Kalman filter algorithm in combination with interpolation significantly improves accuracy of tracking in real-time.","PeriodicalId":191410,"journal":{"name":"2021 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}