2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)最新文献

筛选
英文 中文
HEALTH MATE: Personal Health Tracker Based on the Internet of Things 健康伴侣:基于物联网的个人健康追踪器
Sapna Kumari C, Sahana R, Skanda K Mitta, V. V, Y. S
{"title":"HEALTH MATE: Personal Health Tracker Based on the Internet of Things","authors":"Sapna Kumari C, Sahana R, Skanda K Mitta, V. V, Y. S","doi":"10.1109/ICDCECE57866.2023.10150483","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150483","url":null,"abstract":"With the rise of population and clinical consumption, healthcare has emerged as one of the major issues. It's vital to listen to the body's essential signals for a healthy life. It is quite not possible to provide a patient with continuous monitoring. While it can be problematic to monitor a patient's health and vital conditions for a continuous period of 24 hours, when the patient is engaged in his everyday life and can communicate the health condition status with the specialist doctors via the Internet of Things. By Using non-invasive biomedical sensors that are responsible for five parameters of human vital health, i.e., —Electrocardiograph (ECG), Heart rate, Oxygen Levels, Body Temperature, and Pulse— this paper suggests a paradigm for monitoring people's health. The suggested method makes use of a microcontroller Arduino Mega that is connected to a safe non-invasive sensor and those relate to each other, and the information is viewed on the display of LCD.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132107010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Art System of Picture Composition Based on Computer Video Processing Technology 基于计算机视频处理技术的图像构图艺术系统
S. Qiu, Ning Wang
{"title":"The Art System of Picture Composition Based on Computer Video Processing Technology","authors":"S. Qiu, Ning Wang","doi":"10.1109/ICDCECE57866.2023.10150599","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150599","url":null,"abstract":"With the development of science and technology and the renewal of media means in the era of cultural industry, electronic media develops rapidly, video image technology with digital realization as the carrier develops rapidly, and gradually becomes an independent art form, which indicates the arrival of a new type of art. The purpose of this paper is to study the picture composition art system based on computer video processing technology. From the picture composition art overview to the introduction of basic knowledge of computer science, and then to the main technology of computer video processing, summed up the coordinate space and its transformation, geometric transformation technology of graphics and other knowledge. This paper mainly analyzes the program flow of picture composition art system and modern geometric composition law module, and introduces the application of video frame in image processing. The real-time performance and effect of the system are tested. When processing video art image composition, the CPU usage of real-time processing is about 40%, If you don't process the video, but just play it, the average CPU usage is about 20%. The real-time performance of video processing can be realized effectively through the image synthesis art system.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134283130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Performance Optimization of Approximate Minimum Spanning Tree for The Different Mobility Model 不同迁移率模型下近似最小生成树的性能优化
H. V, S. K
{"title":"The Performance Optimization of Approximate Minimum Spanning Tree for The Different Mobility Model","authors":"H. V, S. K","doi":"10.1109/ICDCECE57866.2023.10150668","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150668","url":null,"abstract":"A minimum spanning tree (MST) is a type of graph algorithm used to find the optimal solution for connecting nodes in a given network. It is used in sensor networks to connect the sensors in a given area efficiently. The MST algorithm finds the shortest paths between all pairs of nodes in the network, thus minimizing the energy cost of communication. The MST algorithm starts by finding the shortest path between two nodes. It then expands the search to find the shortest paths between all other pairs of nodes. To do this, the algorithm considers the weights of all the edges connecting the nodes and finds the path with the lowest total weight. The approximate minimum spanning tree algorithm is a variation of the classic MST algorithm. This algorithm uses heuristics to reduce the running time of the algorithm. It eliminates certain paths that do not contribute to the overall optimal solution. By eliminating these paths, the approximate MST algorithm can quickly find the optimal path without sacrificing the quality of the path. The approximate MST algorithm is used in sensor networks to quickly find the optimal paths between nodes. This algorithm can be used to reduce energy costs associated with communication and ensure that the most optimal path is chosen. It is also useful for finding the shortest paths between multiple nodes in a given area.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132165630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trustworthy Data Verification Technique for Cross-Chain Data Sharing Based on Merkle Trees 基于Merkle树的跨链数据共享可信数据验证技术
Ruping Wang, Siqi Zhong, Qin Zhou, Jun Tu
{"title":"A Trustworthy Data Verification Technique for Cross-Chain Data Sharing Based on Merkle Trees","authors":"Ruping Wang, Siqi Zhong, Qin Zhou, Jun Tu","doi":"10.1109/ICDCECE57866.2023.10150492","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150492","url":null,"abstract":"Cross-chain data sharing is a promising solution for integrating different blockchain networks and improving their interoperability. However, data security and trustworthiness are major concerns in cross-chain data sharing, as data may be altered or corrupted during the sharing process. In this paper, we propose a novel technique for data verification in cross-chain data sharing based on Merkle trees. By establishing the merkle tree relay mechanism, the Merkle tree is used to build a decentralized environment, and the cross-chain transaction data is verified safely and efficiently, so that the data can be shared between different blockchain networks while maintaining the integrity and credibility of the data. The technology ensures the integrity and credibility of the data by using the characteristics of the Merkle tree. It provides an efficient and secure way to validate data in a decentralized environment. We also describe the implementation of the technique and experimentally demonstrate its effectiveness. Experimental results show that measuring the time required to verify shared data using Merkle tree to evaluate the technology provides a reliable and efficient solution for cross-chain data sharing, which can be used to build secure and trusted decentralized applications.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133564934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
1-Bit Comparator Designed by Multithreshold FinFET based Sleep Transistor Technique in 18nm 基于18nm多阈值FinFET睡眠晶体管技术设计的1位比较器
Ricky Rajora, K. Sharma, Anjali Sharma
{"title":"1-Bit Comparator Designed by Multithreshold FinFET based Sleep Transistor Technique in 18nm","authors":"Ricky Rajora, K. Sharma, Anjali Sharma","doi":"10.1109/ICDCECE57866.2023.10151417","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10151417","url":null,"abstract":"Power efficiency in VLSI circuits can be achieved by using several new logic families which are characterized by complementary CMOS technique. New efficient techniques can be achieved by using both high and low threshold FinFETs in digital circuits. Operation of theses FinFETs can be obtained differently in active and sleep mode as per the logic requirement. In this study, multithreshold technique called sleep transistor technique (STT) has been compared with traditional single threshold technique called complementary FinFET technique (CFT). In STT, high threshold transistor is used as sleep transistors which can be operated differently in active and standby mode. FinFET based comparator design has been implemented by both techniques by taking 18nm foundry base. For comparative parametric analysis, product of power consumption and energy with delay i.e. PDP and EDP have been considered. The analysis depicts that multithreshold technique consumes less power and having higher speed of operation as compared to traditional technique. Also, transient response of STT technique has shown no threshold loss problem, which makes it suitable for cascade operation in low power VLSI circuits.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117202249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Smart Development of the Large Scale Sensing Techniques in Intelligent Industrial Automation 智能工业自动化中大规模传感技术的智能化发展
G. S, Mahesh Tr
{"title":"The Smart Development of the Large Scale Sensing Techniques in Intelligent Industrial Automation","authors":"G. S, Mahesh Tr","doi":"10.1109/ICDCECE57866.2023.10150691","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10150691","url":null,"abstract":"Intelligent industrial automation is becoming increasingly popular, as companies look to automate processes and maximize efficiency. One way they are achieving this is through the use of large scale sensing techniques. These techniques enable companies to monitor the performance of their equipment and make adjustments if necessary. Large scale sensing techniques are used in industrial automation to detect physical quantities such as temperature, pressure, flow, and vibration. By using sensors, companies can detect problems before they become serious issues. This allows them to make changes and keep their machines running as efficiently as possible. Large scale sensing techniques are also used to monitor the environment in which machines are operating. This can help companies identify potential risks, such as high temperatures or humidity, and take the necessary measures to avoid damage. It can also help companies make better decisions about how to deploy their resources to maximize efficiency. Lastly, large scale sensing techniques can be used for predictive maintenance. By monitoring the performance of machines, companies can detect potential problems early on and take preventive measures before they become serious. This helps to avoid costly repairs and downtime, and ensures that companies are able to keep their machines running smoothly.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117346912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Smart City Implementation using IoT-Cloud Based System Architecture 基于物联网云系统架构的智慧城市实施框架
V. Dankan Gowda, K. Prasad, Tanmoy De, Ved Srinivas, N. Anil Kumar, Tejashree Tejpal Moharekar
{"title":"A Framework for Smart City Implementation using IoT-Cloud Based System Architecture","authors":"V. Dankan Gowda, K. Prasad, Tanmoy De, Ved Srinivas, N. Anil Kumar, Tejashree Tejpal Moharekar","doi":"10.1109/ICDCECE57866.2023.10151365","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10151365","url":null,"abstract":"The Internet, a key participant (world wide web) in worldwide information exchange and media sharing, has experienced cumulative upgrades, developments, and given up consequent product IOT, making technology affordable and practical for all uses. Research development includes smart sensors, a communication channel and protocols for exchanging data, and peripherals like an Arduino, a Texas Instruments MSP430G2553, a Weather-proof Tx. Rx. Kit (for exchanging data), a Data Receptor and Decoder Shield for Lab View Kit (for exchanging data), an addressing and de-addressing data module, a communication shield, etc. It is now possible to communicate from a desktop computer or an Android smartphone to a portable device that has an embedded device, such as a microcontroller, a microprocessor, or a sensor. In other words, IOT combines always-on networking, always-on computation, and always-on intelligence. The Internet of Things facilitates communication between the central hub (fitted with a Lab-View interface) and the distributed modules (found in places like parks, subways, and highways) that control the lights. The Internet of Things is also useful for keeping the overall cost of setup and maintenance within reasonable economic bounds. The planned development takes into account IoT on two main scales: city-wide automation (also known as smart city) and home-level automation (also known as covering up).","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122022678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Urban Waterlogging Area Planning Based on Computer and GIS Technology 基于计算机和GIS技术的城市内涝区规划
Hanlin Wang, Gaoxiang Ren, Xuanying Zhang, Rongjian Nie, Wei Cai, Bin Xiao, Yanbiao Wang
{"title":"Urban Waterlogging Area Planning Based on Computer and GIS Technology","authors":"Hanlin Wang, Gaoxiang Ren, Xuanying Zhang, Rongjian Nie, Wei Cai, Bin Xiao, Yanbiao Wang","doi":"10.1109/ICDCECE57866.2023.10151032","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10151032","url":null,"abstract":"Urban flood disaster caused by heavy rain is the main natural disaster faced by cities, which not only seriously affects the traffic of cities, but also threatens the life and property safety of urban residents. Research on urban inundated area planning can effectively deal with the loss caused by urban flood disaster. In this study, one-dimensional and two-dimensional coupled hydrodynamic simulation model of urban area was established by using computer and GIS technology, and the rainfall return period of 5-year, 10-year, 20-year and 50-year was selected for simulation study. The simulation results were planned and displayed by GIS. The main conclusions are as follows: the coupling model of one-dimensional and two-dimensional hydrodynamics can be used to model the rainfall confluence process in urban areas. The combination of computer technology and GIS technology can provide scientific basis and technical support for urban flood control and drainage and inundation area planning, and the simulation results can be shown accurately and vividly. With the increase of rainfall recurrence period, the inundation range and the number of inundation risk points in the study area increased, and the inundation range in the same risk area expanded. Together, this modeling and evaluation method can help city management committees assess the potential risk of urban waterlogging, particularly in areas with high risk of waterlogging under extreme rainfall that may occur in the future.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Vulnerability and Key Points of Encryption Technology of Computer Information Technology Data 计算机信息技术数据安全漏洞及加密技术要点
Min Sun
{"title":"Security Vulnerability and Key Points of Encryption Technology of Computer Information Technology Data","authors":"Min Sun","doi":"10.1109/ICDCECE57866.2023.10151186","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10151186","url":null,"abstract":"With the continuous development of computer information technology, data storage and processing methods have changed, which has a great impact on information security. This paper describes the work done in this field at home and abroad. In combination with the emergence of new technologies such as network technology and cloud computing in the current era, it provides us with convenient conditions. At the same time, it also discusses how to apply these new science and technology to reality, and puts forward corresponding measures for reference and suggestions. This paper first introduces the data storage and processing methods of computer information technology and related concepts, and then briefly describes and analyzes computer information technology and information security. An encryption technology model for security vulnerabilities is designed to test the encryption technology performance of the model. The test results show that when the key is public key encryption, the running time is less than that of private key encryption, which means that with the increase of the number of files, the computational complexity increases at a relatively fast linear speed.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Website UI Design Interactivity and Interface Visual Design Based on Improved DFA Algorithm 基于改进DFA算法的网站UI设计交互性与界面可视化设计
Fang Miao
{"title":"Website UI Design Interactivity and Interface Visual Design Based on Improved DFA Algorithm","authors":"Fang Miao","doi":"10.1109/ICDCECE57866.2023.10151237","DOIUrl":"https://doi.org/10.1109/ICDCECE57866.2023.10151237","url":null,"abstract":"With the rapid development of the Internet, people rely more and more on network information. As a new means of communication, the interaction design of websites is particularly important. In this process, factors such as page layout, interface elements and colors should be considered. This paper has carried out a large number of related literature research on user browsing experience. By analyzing and summarizing the DFA algorithm model and calculation formula, determine the UI design scheme and implementation process based on the improved method. On this basis, the existing B/S architecture and functional modules are specifically optimized by using software engineering courses, and the overall effect of the website is evaluated by using the theoretical knowledge of interaction design. The evaluation test results show that the website UI design interactivity and interface visual design platform based on the improved DFA algorithm has high compression efficiency, and can design the website UI interface smoothly.","PeriodicalId":221860,"journal":{"name":"2023 International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116104727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信