2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)最新文献

筛选
英文 中文
Safety and Cost Analysis of Electric Vehicle 电动汽车的安全性和成本分析
Suryanarayan Sharma, Upendra Singh Yadav, S. K. Srivastava
{"title":"Safety and Cost Analysis of Electric Vehicle","authors":"Suryanarayan Sharma, Upendra Singh Yadav, S. K. Srivastava","doi":"10.1109/ICERECT56837.2022.10060291","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060291","url":null,"abstract":"This paper examines some of the potential dangers associated with electric vehicles, as well as how European Union and UN type-approval procedures lessen the risks to users. It does so by highlighting any regulatory loopholes as well as the international initiatives now ongoing to remedy them. The main focus of this research paper is on vehicle dangers, with some thought given to how they are likely to be exploited by the general population. Infrastructure-related hazards, such as vehicle charging or battery exchange, are often excluded since they are likely to come under a different regulatory framework.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"63 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125998357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modelling of A Speech Enhancement Techniques Using CNN Approach 基于CNN方法的语音增强技术建模
Rupal Gupta, A. Babu
{"title":"Modelling of A Speech Enhancement Techniques Using CNN Approach","authors":"Rupal Gupta, A. Babu","doi":"10.1109/ICERECT56837.2022.10060495","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060495","url":null,"abstract":"Speech enhancement entails improving speech that has been damaged by noise. Speech enhancement increases a speaker's ability to be understood by human listeners. Recent years have seen a huge increase in interest in deep learning techniques for improving speech, which require both clear and noisy speech for training. However, it can be difficult to get a clear speech signal in realistic situations. Speech enhancement entails improving speech that has been damaged by noise. Speech enhancement increases a speaker's ability to be understood by human listeners. Recent years have seen a huge increase in interest in deep learning techniques for improving speech, which require both clear and noisy speech for training. However, it can be difficult to get a clear speech signal in realistic situations. The testing results address the convenience of the created SE application in uproarious environmental elements and show prominent progressions over the best in class philosophies.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126711296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encryption-based Malware Detection for Cloud Computing 基于加密的云计算恶意软件检测
Shylaja N S, B. Pandey
{"title":"Encryption-based Malware Detection for Cloud Computing","authors":"Shylaja N S, B. Pandey","doi":"10.1109/ICERECT56837.2022.10060207","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060207","url":null,"abstract":"In today's scenario Artificial Intelligence (AI), Machine learning, Deep learning, Cloud Computing and the Internet of Things (IoT) are considered to be new methodologies to resolve variations in real-life issues. These methods are significantly used in different industries such as transportation schemes, smart cities, healthcare systems, and agriculture to offer fertile outcomes for lots of problems in today's situation. Cloud computing is an authoritative device to optimize the price in terms of utility, manageability, and hardware for distributing the information, because of the aforementioned features most association convert their services and applications to the cloud. However, some malware ransom ware is difficult to detect without running them. The security information groups endure improving advanced procedures for encryption augmented to cloud facilities. This research focused on malware detection and resolving the security problems in cloud computing by using encryption techniques. The countermeasures for separate susceptibility are based on the investigation outcomes discussed. This comprehensive research supports the researchers in accomplishing a better solution for malware detection on cloud computing)","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124356607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Migraine Prediction Using Deep Learning Model 使用深度学习模型预测偏头痛
Anjana Jalannavar, Suvarna G. Kanakaraddi, Vidya S. Handur
{"title":"Migraine Prediction Using Deep Learning Model","authors":"Anjana Jalannavar, Suvarna G. Kanakaraddi, Vidya S. Handur","doi":"10.1109/ICERECT56837.2022.10059843","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059843","url":null,"abstract":"A migraine is a headache which could reason very terrible palpitate ache, commonly on one part of the head. Symptoms of migraine are nausea, vomiting, and intense sensitivity to brightness and sound. Migraine attacks that may cause for hours to days, and the ache may be so intense that it interferes with each day ventures. Migraine and episodic headache are one of the most common kinds of primary headache. Migraine is considered as a severe health trouble that impacts the pleasant life. Migraines, which have an effect on youngsters and teens in addition to adults, can developed via 4 stages: prodrome, atmosphere(aura), charge and post-drome. Not everybody who has migraines is going via all stages. The paper tries to focus on the migraine prediction by the use of deep learning model. This paper proposes or provides a Machine Learning technique and model to discover the sort of migraine.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advantages of using Containerization Approach for Advanced Version Control System 在高级版本控制系统中采用容器化方法的优点
V. Singh, Amarjeet Singh, A. Aggarwal, S. Aggarwal
{"title":"Advantages of using Containerization Approach for Advanced Version Control System","authors":"V. Singh, Amarjeet Singh, A. Aggarwal, S. Aggarwal","doi":"10.1109/ICERECT56837.2022.10059738","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059738","url":null,"abstract":"DevOps is largely recognized as the one of the most influential development technique for a business, thus many companies have adopted it. The advantages of DevOps are numerous since it successfully enables both the development and operations departments to collaborate in order to reach the organization's objective goal more quickly and efficiently. Continuous Integration and Continuous Development are two major components or procedures in DevOps culture. The success of DevOps in a company is determined by how well workflow operations, such as automation and scaling, are implemented in the production environment. In this work, various advantages of using containerization approach for an advanced version control system are discussed with the help of few experimentations. Various DevOps systems which have been proposed for version manipulate migration are explored. Experimentation has been done with respect to success/error, average duration and API calls breakdown.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127907091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-Efficient Routing Protocols for Wireless Sensor Networks 无线传感器网络的节能路由协议
Bhoomi Ripal Shah, Y. N
{"title":"Energy-Efficient Routing Protocols for Wireless Sensor Networks","authors":"Bhoomi Ripal Shah, Y. N","doi":"10.1109/ICERECT56837.2022.10060003","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060003","url":null,"abstract":"Wireless Sensor Networks (WSN) has been a topic of research since a very long time. The importance of WSN is of huge diversity as it is used in military services, environmental services, medicine, agriculture, etc. WSN is a composition of many sensor nodes that work together to send data from the source to the base station. The sensor nodes are placed systematically inside a network. The design of this network is of most importance as it deals with the reliability, efficiency, energy consumption, delay, and lifetime of the entire WSN. The longest lifespan of the system and lowering sensor node energy consumption are given top priority while developing a WSN. Various types of routing algorithms are used in the perspective of this. In this paper, the author has bifurcated the routing protocols into four main categories which are Multi-hop, Hierarchical, Cluster-based, and Long range. Apart from these, the author has also mentioned routing methods on Fault tolerance, Neutral network, Query based, and Swarm intelligence.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach of Augmented Reality in Field of Furniture Shopping 家具购物领域的增强现实方法
Anand Joshi, Sachin Jain
{"title":"An Approach of Augmented Reality in Field of Furniture Shopping","authors":"Anand Joshi, Sachin Jain","doi":"10.1109/ICERECT56837.2022.10060853","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060853","url":null,"abstract":"The world as we know it today is driven by technology. If servers of tech behemoths like Google, Facebook, and others stop working for a short period of time, the world suffers significant losses, usually measured in the millions. To operate, every business relies on a number of technologies in addition to its hardware and software. Although we live in a technologically advanced world, commercial applications for augmented reality are still relatively rare. Just two examples of businesses that have employed augmented reality to make money from the entertainment sector are Snapchat and Pokémon Go. However, augmented reality hasn't been widely applied in e-commerce or other economic areas. The premise of the provided application is that augmented reality technology is vastly underutilized in the e-commerce industry. As a result, we conduct a thorough literature review of the academic corpus that is centered on AR retail in this study. We discuss the use of augmented reality (AR) in retail, its technological characteristics that are frequently examined, as well as the potential psychological and behavioural effects that augmented reality may have. This essay will discuss how to develop applications, conduct research, and conduct tests.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130471174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reindustrialization Using Industry 4.0 Maturity Models in Msmes and Tenets of Digital Transformation Phases 基于工业4.0成熟度模型的中小微企业再工业化及数字化转型阶段原则
Kavita Bhatt, S. M. Kumar
{"title":"Reindustrialization Using Industry 4.0 Maturity Models in Msmes and Tenets of Digital Transformation Phases","authors":"Kavita Bhatt, S. M. Kumar","doi":"10.1109/ICERECT56837.2022.10060716","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060716","url":null,"abstract":"In today's competitive world, sustainability is a key element for any organization. Integrating digital technologies to accelerate process and sustainability aligned to key elements of any organization like - people, process, strategy, technologies, revenues and extension of the organization to accelerate process is called Digital Transformation. Digital Transformation (DX) and its disruptive technologies has its own attached benefits that provides multiple opportunities and possibilities to MSMEs to promote their growth. Industry has moved from mechanized system to virtual world leveraging industry 4.0 practices like AI, machine learning, strong network connection and ensuring effective digital transformation from physical world to virtual world. Digital connectivity defines the pillar for adoption of advance technologies required for industrial revolution. Small and medium sized organization/manufacturing unit has great impact on country's economic growth and indirect impact on large scale companies. Micro, small and medium industries can be moved to digitization by leveraging industry 4.0 practices and maturity model. This paper suggest that fourth industry is growing exponentially in recent past, and it drives a need to derive the structural model technique to model relationship between organization and its sustainability functions. There is little study done on how small-scale companies can scale the digital transformation from conventional model to interconnected and virtual model. Studies are conducted on readiness level of the MSMEs in adopting Industry 4.0 standard. This paper discuss questions like how far the MSMEs are ready for digital transformation. Authors classified the MSMEs into various groups depending on level of Maturity parameter I4.0 measures, using the index aligned to industry 4.0 practices. This study finds out different dimensions suggested for development of industry 4.0 maturity and readiness model which need attention when moving forward for Industry 4.0 and its adoption and corresponding future framework. They are Strategy, Organization, Supply Chain, Manufacturing, Operations, Customers, Product, Services, Business Model, IT, People, Culture to assess an organization's I4.0 maturity and readiness levels.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128297391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of Transformer Windings (Not Under The Test) on The Frequency Response (FR) of The Winding Under The Test 变压器绕组(非测试)对测试绕组频率响应(FR)的影响
M. Gojiya, K. Badgujar
{"title":"Effect of Transformer Windings (Not Under The Test) on The Frequency Response (FR) of The Winding Under The Test","authors":"M. Gojiya, K. Badgujar","doi":"10.1109/ICERECT56837.2022.10059976","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059976","url":null,"abstract":"Sweep frequency response analysis (SFRA) is most conscious to changes in the electrical elements (R, L, C) related to the test setup and test object. Therefore, in order to monitor even the smallest winding movement in a transformer, SFRA testing is a very effective technique. The effect of changes in such electrical elements associated with the test setup (outside the test object) on the FR of the winding should be neglected. Similarly, the FR of the test object is affected by a factor located inside the transformer and unrelated to the test object. It is the transformer winding that is not being tested. All transformer windings are connected together. Even if one of the windings has a mechanical fault, it can interfere with the frequency response of the other healthy windings, even if it is not tested. In this article, experiment results are used to explore this idea.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Hybrid Authentication Mechanism for Cloud Server to Enhance the Computational Efficiency 一种提高计算效率的云服务器混合认证机制
Ramakrishna Gandi, K. D. Charan, K. B. R. Naidu, Kamparapu V V Satya Trinadh Naidu, Y. R. Raju
{"title":"An Hybrid Authentication Mechanism for Cloud Server to Enhance the Computational Efficiency","authors":"Ramakrishna Gandi, K. D. Charan, K. B. R. Naidu, Kamparapu V V Satya Trinadh Naidu, Y. R. Raju","doi":"10.1109/ICERECT56837.2022.10059808","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059808","url":null,"abstract":"The present computer era is based in large part on research, processing and safe storage in distributed computer networks of confidential data. In view of the development of various cryptographical algorithms, several research studies have addressed this issue. In addition to the stressful cryptographic studies, it is noted that the protection of data on the server side is vulnerable to handle, and there is need to build and effectively provable security framework that will boost the efficiency of Cloud Server data processing. This paper proposes a new protection scheme which authenticates evidence that sensitive data are stored safely when a cloud-central cloud storage architecture is deployed. This article introduces an innovative computer security mechanism that solves the issue of internal nodes by reducing the overhead computer with powerful security algorithms. The experimental study reveals that the proposed mechanism exceeds most current defense mechanisms.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128459760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信