2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)最新文献

筛选
英文 中文
Modeling and Simulation of Graphene NanoribbonField Effect Transistor (GNRFET) 石墨烯纳米带场效应晶体管(gnfet)的建模与仿真
Nanda B.S, Puttaswamy P.S
{"title":"Modeling and Simulation of Graphene NanoribbonField Effect Transistor (GNRFET)","authors":"Nanda B.S, Puttaswamy P.S","doi":"10.1109/ICERECT56837.2022.10060590","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060590","url":null,"abstract":"Down scaling of Si MOSFET popular for decades ago for better circuit performance to suites Moore's law. Problem of scaling of Si MOSFET is difficult - reached maximum limit. To address this challenge present day research is focused on identifying new alternative materials and devices that can potentially replace the silicon transistors. Due to the attractive physical properties of Graphene nanoribbon(GNR), research is carried out to use GNR as a channel material for in the next generation integrated circuits and systems for electronic applications. Double gate GNR FET device is modeled and simulated using full quantum transport model in mode space with non Equilibrium Green's functions (NEGF). This paper discusses the physical modelling of double gate GNRFET with different high k dielectric gate oxide materials and investigates the device characteristics for different GNR widths. The obtained results represents that it shows a MOSFET type behaviour. It is also observed that the ION/IOFF ratio of GNRFET with TiO2 as gate dielectric for GNR (13,0) is equal to $2.32times 10^{3}$ and the ION/IOFF ratio of GNRFET with Hf02 as gate dielectric for GNR (13,0) is equal to $3.74times 10^{2}$","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131651571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Automation Technology in Road and Bridge Detection System Based on Artificial Intelligence Technology 自动化技术在基于人工智能技术的路桥检测系统中的应用
Qingqing Cheng, Tao Huang, Ze Li
{"title":"Application of Automation Technology in Road and Bridge Detection System Based on Artificial Intelligence Technology","authors":"Qingqing Cheng, Tao Huang, Ze Li","doi":"10.1109/ICERECT56837.2022.10060200","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060200","url":null,"abstract":"This paper briefly introduces the advantages and significance of road and bridge detection and recognition methods based on artificial intelligence, introduces the contents of road and bridge detection and recognition, analyzes on the problems existing in the application of road and bridge detection methods, and puts forward suggestions for improvement measures. According to the application status of bridge detection technology in China, the development trend of highway bridge detection is proposed.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134433270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of The Hevc Transform Unit and Early Partition Termination Hevc变换单元及分区提前终止分析
N. Ram, S. Sharma
{"title":"Analysis of The Hevc Transform Unit and Early Partition Termination","authors":"N. Ram, S. Sharma","doi":"10.1109/ICERECT56837.2022.10060665","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060665","url":null,"abstract":"One of the main reasons HEVC coding is so much better than previous video coding standards is the variable TU size. HEVC uses the remaining quad tree to limit the above bits and allow flexibility in TU partitioning. Moreover, the adaptability of TU size greatly increases the complexity of the coder. This article discussed the implicit splitting of transform units used in HEVC to reduce encoder complexity while preserving encoding performance. This white paper also provides replay results to verify the TU's implicit partitioning encoding. The Joint Coding Task Force (JCT-VC) has recently developed a new generation of video coding standards and given them the moniker High Efficiency Video Coding (HEVC). This new standard offers a significant improvement in picture quality, which is particularly noticeable in videos with a high resolution. On the other hand, the complexity of time is one of the most significant obstacles in HEVC.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133010613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Network Access Control System Model Based on Virtualization Technology 基于虚拟化技术的网络访问控制系统模型研究
Yaowen Sun
{"title":"Research on Network Access Control System Model Based on Virtualization Technology","authors":"Yaowen Sun","doi":"10.1109/ICERECT56837.2022.10059594","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059594","url":null,"abstract":"With the continuous development of computer technology, virtualized network has become an indispensable part of the current social life and economic field. In the operation of computer networks, virtualization technology can effectively realize the information interaction between users and systems, or between servers and applications, and analyze and manage them through virtualization models. In addition, virtualization technology can also analyze and manage network data, thus enabling information interaction between users and servers. This paper first describes the virtualization technology, which mainly analyzes the virtualization technology based on x86 architecture. x86 architecture is mainly analyzed and studied from CPU virtualization, memory virtualization, device and I/O virtualization, and the network access control system based on virtualization technology is proposed to be studied accordingly. Secondly, this paper studies the design and implementation of network access control system based on virtualization technology, mainly analyzes the model of network access control system based on virtualization technology, and carries out detailed design of each subsystem in the system, finally realizes the whole system between different users, between servers and applicants and different types of environments, which can provide users with fast and secure and efficient services.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133240057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature Selection Based Naïve Bayes Algorithm for Twitter Sentiment Analysis 基于特征选择Naïve的推特情感分析贝叶斯算法
Aruna T.M, A. K, Divyaraj G N, P. Pareek
{"title":"Feature Selection Based Naïve Bayes Algorithm for Twitter Sentiment Analysis","authors":"Aruna T.M, A. K, Divyaraj G N, P. Pareek","doi":"10.1109/ICERECT56837.2022.10060604","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060604","url":null,"abstract":"A intriguing areas of study now is Twitter sentiment investigation. It fuses the data mining methods used to create such systems with natural language processing techniques. The majority of currently available methods for analyzing Twitter sentiment do not do well when presented with messages that are both brief and ambiguous, since this is the only kind of information they take into account. Better classification outcomes are guaranteed if the right collection of features is used to identify emotion in online textual material. The computational difficulty of doing optimal feature selection drives the need for the development of creative approaches to enhancing classifier performance. In this work, an effective method for analyzing Twitter user sentiment was presented. A machine learning model was developed by the suggested method to identify good and negative tweets. Characteristics are extracted after pre-processing, and it's possible that include irrelevant features can lower classification accuracy. For this reason, the model implemented the Vortex Search Algorithm (VSA) to choose the best characteristics and discard the rest. The final tweets categorization is done using the Naive Bayes (NB) algorithm. A total of four Twitter datasets are used for the studies, each measuring a unique set of parameters and made accessible to the public. Marketing, detecting political polarization, and product reviews are just a few of the many areas that may benefit from the suggested system's ability to gauge user sentiment based on tweets.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133894559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Investigation of Secure and Safe Message Communication in Automotive Network 汽车网络中安全信息通信的研究
Anurag Gupta, Mukesh Kataria
{"title":"An Investigation of Secure and Safe Message Communication in Automotive Network","authors":"Anurag Gupta, Mukesh Kataria","doi":"10.1109/ICERECT56837.2022.10060431","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060431","url":null,"abstract":"We investigate the feasibility of vehicle-to-vehicle secure correspondence using public key cryptography in this paper. We run a model through its paces in real-world driving scenarios. Estimation data show that the framework is plausible in terms of postponement and misfortune, and that we can normally anticipate superior execution over average recreation works anticipate. In any case, we find that gridlock and the display of public key cryptography can pose significant challenges.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124120940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Exploration on building of Smart Office through AI and IOT 基于AI和IOT的智慧办公建设探索
Ranjana Sharma, K. S.
{"title":"An Exploration on building of Smart Office through AI and IOT","authors":"Ranjana Sharma, K. S.","doi":"10.1109/ICERECT56837.2022.10059619","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059619","url":null,"abstract":"The Internet of Things (IoT) has completely changed how many different sectors are served. These industries are currently a promising ground for researchers to apply IoT. The purpose of this study is to suggest an intelligent IoT-based office concept. It focuses on three areas in order to produce a productive working environment. We suggest a system for the Internet of Things-enabled smart office. Our system configuration, which uses Google Voice Over Protocol and Android-based applications, makes it easy to manage a smart office environment. This system is possibly reasonable for bigger office spaces thanks to the utilization of lightweight MQTT favourable to tools, high-recurrence RF trans-beneficiaries, and Raspberry 2 Z-wave-based significant distance regulators. PIR, gas, fire, sound, light, temperature, and moistness sensors are remembered for the system for low power utilization, elite execution, and fast chance to-time reaction QoS boundaries. With a committed channel for every sensor signal, safeguarded by AES encryption, and fitting and-play highlights, we ensure trustworthy correspondence. Also included is mail-based anomaly or emergency alarm notice. Finally, we carried out the experiment and put the created system to the test on Android phones and a smart watch called the Moto360 Watch.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127701501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lake Ice Infrared Image De-noising using Deep Learning Convolutional Neural Network 基于深度学习卷积神经网络的湖冰红外图像去噪
B. P. T., K. K., P. G K, H. K. Virupakshaiah, A. Karegowda
{"title":"Lake Ice Infrared Image De-noising using Deep Learning Convolutional Neural Network","authors":"B. P. T., K. K., P. G K, H. K. Virupakshaiah, A. Karegowda","doi":"10.1109/ICERECT56837.2022.10060448","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060448","url":null,"abstract":"Elimination of noise from the acquired images is one of the fundamental tasks so as to restore the high quality of images to increase the results of segmentation, classification, recognition, detection etc. In this research work, Infrared imaging is used to capture the images with various temperature ranges during day and night time. Infrared thermography is used as a nondestructive image acquisition sensor. So infrared imaging sensors are used to identify and classify different ice types formed on the rivers during winter season in western countries. However, you can observe blur and degradation in the acquired images through infrared imaging, as the climatic nature is involved in the process. These factors affect the quality of the image and also the quantitative analyses of the images. Especially, when there are deeper faults which are found in an under laying substance and high thermal conductivity materials can also be studied. Acquired infrared images are usually affected with noises. In this paper, de-noising of infrared images is carried out using convolution neural network model in deep learning. In this work Gaussian white noise is added to the infrared images with varying noise intensities from 1% to 10% and then the convolution neural network model is applied to de-noise the infrared images. In the qualitative analysis of the infrared images edge factor, uniform region, texture, smoothness, non-uniform region, structure of the region of interest is considered. For quantitative analysis, mean square error, peak-signal- noise-ratio and structure similarity index measure is used. The results of traditional methods of image de-noising are compared with convolution neural network based method. It is concluded from the experimental work that the convolution neural network based method proves to be better for removal of Gaussian white noise when compared with traditional methods.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127856012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Prevention Of Vehicle-To-Vehicle Communications With NS2 用NS2防止车对车通信
Harjinder Singh, M. Rao
{"title":"A Prevention Of Vehicle-To-Vehicle Communications With NS2","authors":"Harjinder Singh, M. Rao","doi":"10.1109/ICERECT56837.2022.10060634","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060634","url":null,"abstract":"In order to overcome disappointment problems, also known as “impasses,” many Vehicle to Vehicle (V2V) communication solutions were put forth in the New Year. This paper suggests a device-to-device (D2D) communication-based model for V2V failure recovery. The combined Wise Intelligent Transportation System engineering allows LTE-based D2D devices to surpass V2V ‘impasses’ disappointment recovery delays. The limitations of conventional V2V steering techniques are overcome by this new worldview of cross breed V2V-D2D communications. The proposed cross breed model reduces the end-to-end delay of message conveyance, as shown by the NS2 reproduction results. To demonstrate the improvements brought about by our solution compared to standard V2V procedures, a thorough examination of various D2D use cases (both the best and the most appallingly terrible scenarios) is presented. In recent years, there has been a growing interest in inter-vehicle communications (IVC), which are based on wireless networks, to gather and distribute traffic information.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127975750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Grid Connected Hres With Modified Sheppard Converter and Fuzzy-PSO Algorithm 基于改进Sheppard变换器和模糊粒子群算法的并网图像分析
R. Sathyapriya, V. Jayalakshmi, K. Sakthivel
{"title":"Analysis of Grid Connected Hres With Modified Sheppard Converter and Fuzzy-PSO Algorithm","authors":"R. Sathyapriya, V. Jayalakshmi, K. Sakthivel","doi":"10.1109/ICERECT56837.2022.10060550","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060550","url":null,"abstract":"Over the last few years, the electricity sector has become increasingly dependent on renewable energy sources (RES]. Green energy has recently become a top priority for experts in order to meet rising electricity demand. As a result, environmental organisations have promoted the utilization of RES like solar, wind and tidal energy as an alternative to fossil fuels for electricity generation. Due to current research and development in power electronics, wind and solar energy, in particular, have been reported to be more practical in large-scale deployment. In this paper, an efficient hybrid renewable energy system integrating solar and wind energy is proposed which utilizes a modified Sheppard Taylor converter. The converter performs regulation of output voltage under varying load and input voltage with negligible input current ripple. A fuzzy-PSO approach is exploited for the efficient tracking of maximum power to obtain optimized results with rapid speed of convergence and the PWM pulses generated provide optimal duty cycle to the converter switch. A grid connected $3varphi$ VSI along with LC filter modelled by dq theory is utilized which converts the stationary abc axis into dq axis that rotates synchronously. The entire system is realized by MATLAB/SIMULINK and the efficient outputs are obtained with reduced THO of 0.86%.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129315142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信