{"title":"Ti/Al Multilayer Ohmic Contact To n-GaN On Sapphire","authors":"M. Nandan, V. Venugopal, S. Shastry","doi":"10.1109/ICEECCOT43722.2018.9001642","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001642","url":null,"abstract":"Ohmic contacts are essential to GaN-based high power devices. Ti/Al layer is the basic building block to depositohmic contacts on n-GaN used for making such devices. Ti (10 nm)/Al (40 nm)/Ti (30 nm)/Al (20 nm) /Ti(20 nm) multi-layer metal scheme was chosento induce Al3Ti formation close to the contact-semiconductor interface and TiAl close to the contact surface. This Ti/Al multilayer has been grown on n-GaN by physical vapor deposition and annealed at 600 °C in nitrogen ambient for 30 s that resulted in contact resistivity of 0.011 0.cm2. This study is focused on eliminating the need of capping and blocking layers, reducing total contact thickness and hence reduce fabrication cost. TiAl3and TiAlalloy formation after annealing was confirmed by GI-XRD while SEM confirmed thermal stability of the contact.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Copyright notice]","authors":"","doi":"10.1109/iceeccot43722.2018.9001391","DOIUrl":"https://doi.org/10.1109/iceeccot43722.2018.9001391","url":null,"abstract":"","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129030416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Electric Vehicles with perspective of Battery Management System","authors":"Daisy Ranawat, M. Prasad","doi":"10.1109/ICEECCOT43722.2018.9001321","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001321","url":null,"abstract":"The present paper discusses the diffusion of electric vehicles. Unlike hybrid electric vehicles, which are partially powered by electricity, battery electric vehicle has the potential to reduce fossil fuel use even more than before. Many technologies like regenerative braking, autopilot system, auto-start and shut off, and even more advanced technology are used to make them as good as the conventional vehicle or even better. Drive system and converters used in the Electric Vehicle have also been discussed in this paper.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114732692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Arithmetic unit for RNS using 2n-3 as Base","authors":"Nagaraj R. Aiholli, R. Rachh, U. Wali","doi":"10.1109/ICEECCOT43722.2018.9001339","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001339","url":null,"abstract":"Modular arithmetic is extensively used in cryptography and other applications. Choice of the base number for modular arithmetic is a critical factor. Folding of resulting numbers after a modulo operation is complex and needs special attention. In this paper, modulo 2n-3 architecture based on mapping of partial product bits under modulo operations is described. Each word of the partial product is mapped once normally and then with a bit left shift corresponding to the base number. In specific, an implementation of squarer is discussed with reference to bit folding in 2n-3 architecture. The results are compared with similar architectures described in available literature with respect to area and delay. The proposed architecture shows improvements in both area and delay.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128038860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lactobacillus Bacterial Cell Segmentation Based on Marker Controlled Watershed Method","authors":"M. Shetty, B. R","doi":"10.1109/ICEECCOT43722.2018.9001460","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001460","url":null,"abstract":"A technique for the segmentation of Scanning Electron Microscopic (SEM) image of bacteria cells is proposed. There have been lots of efforts to replace the human eye inspection of biological data by automatic inspection. SEM image inspection is one of the major initiatives in this direction. Conventional biologist identify bacteria using colony morphology or by using bio-chemical approaches. However these approaches are tedious, time consuming and depends on the expertise of biologist. It is a complex task to segment SEM image of bacteria cells due to diversity of patterns, high level of noise content and variation in the image offset. In order to preserve the details at fine scales, marker controlled watershed is used, where markers are generated automatically this helps in limiting over segmentation. Experiment shows that method can accurately and quickly segment the bacteria cells.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Automatic Water Level Controller","authors":"S. Suraj, V. Bharath, N. K. Sridhar","doi":"10.1109/ICEECCOT43722.2018.9001551","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001551","url":null,"abstract":"Water is one of the essential need for the survival of all human beings, animals and plants. The water overflow from the overhead tanks in the houses, commercial properties, educational institutions and agricultural farms increases the percentage of water wastage. To avoid such wastages implementation of an automatic water level controller becomes a key factor which further reduces human intervention. In this work, an automatic water level controller using bluetooth wireless technology and Ultrasonic water level sensor is proposed. The study of automatic water level controller using wireless technology and wired technology was carried out separately. The results indicated that automatic water level controller using wireless technology was superior in comparison with wired technology which was further validated with the help of different parameters.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121609285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of High Speed, Reconfigurable Multiple ICs Tester using FPGA Platform","authors":"Basavaraj Rabakavi, S. Siddamal","doi":"10.1109/ICEECCOT43722.2018.9001588","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001588","url":null,"abstract":"As the technology shrinks complexity and density are increasing. It is required to maintain the quality and reliability of the IC designed. High testing cost of these ATE machines, leads to the validation of VLSI circuits more complicated. The testers used in small scale industries and academics test single IC at a time. In this paper the authors have proposed FPGA based IC tester which is indigenous, high speed, reconfigurable easy to use. The designed IC tester has multiple IC testing capability. This FPGA based tester supports different packages like DIP and SOIC. This design suits for small scale and medium scale industries and also for academics. For determining the DUT whether it is functionally working or not, proposed IC tester sends a series of inputs to DUT, receives actual outputs from DUT and compares them with expected outputs. The proposed IC tester have advantage of testing multiple ICs at the same time with high speed of about approximate worst case 0.001 sec compared to existing testing with speed of 0.8 sec for single package. Thus the system is completely flexible for use in most small & medium-scale testing application.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115949679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Encryption using Integer Wavelet Transform, Chaotic Maps and DNA rules","authors":"Ramya Veena U, V. Thanikaiselvan","doi":"10.1109/ICEECCOT43722.2018.9001553","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001553","url":null,"abstract":"In this computerized 21st century, medical field has grown to great heights, that the patient has no need to carry his medical records in black and white, but could get them transferred through any communication medium via cloud whenever required. The medical records mainly consists of non-image data and image data. The image data, primarily in digital format has to be transmitted in a way more securely, since all transmission of data occurs via unsecure channels of media through internet. In medical field this process is known as “Medical Image Sharing”. The attacks on the medical images by the intruders may lead to disruptions or may alter the information to a wrong patient. In this business era, the details of a patient can be completely be misused to risk the patient's life. Hence, there are many methods to securely share the medical images using encryption and chaotic maps. Here, secureness is done by admixing three levels of scrambling using IWT (Integer Wavelet Transform), multi-chaos using three alternating chaotic maps (logistic map, tent map and complex quadratic chaotic map), and encrypting the image by alternating the eight special rules of the helical DNA (Deoxyribo Nucleic Acid) along with alternating XOR (Exclusive OR gate), XNOR (Exclusive negative OR gate) logic and piece-wise linear chaotic map within the rules. The obtained results have been validated to transmit a medical image in a more secure way.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130258833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Star Shaped Search Pattern Based Image De-noising","authors":"H. N. Vidyasaraswathi, M. C. Hanumantharaju","doi":"10.1109/ICEECCOT43722.2018.9001598","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001598","url":null,"abstract":"The investigation for well-organized picture De-blurring techniques are still valid challenge, because of their complexities in functional analysis and statistics. In this research, a series of salt-and-pepper (SAP) noise reduction method based on star shaped search pattern that can be applicable for monochrome images is presented. A great benefit of the proposed De-blurring is robotical detection of noise position based on star shaped search pattern and replacement of noisy pixels. The proposed De-blurring is also named as star shaped search pattern-salt & pepper- image de-noising (SSSP-SP-ID). The SSSP-SP-ID system is customizable and furthermore it is easy and fast. The investigation shows that the SSSP-SP-ID De-blurring algorithm have better outcomes compared to other state-of-the-art algorithms, when the noise density (ND) is moderate or high. The performance of SSSP-SP-ID De-blurring algorithm is measured using quantitative performance measures such as peak signal-to-noise ratio (PSNR), structure similarity index measure (SSIM) and image enhancement factor (IEF).","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130466724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akankshi Mody, Shreni N. Shah, Reeva Pimple, N. Shekokar
{"title":"Identification of Potential Cyber Bullying Tweets using Hybrid Approach in Sentiment Analysis","authors":"Akankshi Mody, Shreni N. Shah, Reeva Pimple, N. Shekokar","doi":"10.1109/ICEECCOT43722.2018.9001476","DOIUrl":"https://doi.org/10.1109/ICEECCOT43722.2018.9001476","url":null,"abstract":"With the rise of the Internet, cyber bullying is becoming more and more widespread. Cyber bullying has resulted in such disastrous consequences that there is a pressing need to detect it. The aim of this study is to do the same by using sentiment analysis. We perform cyber bullying detection using a novice approach on Tweets using Natural Language Processing and Machine Learning techniques. After processing a tweet, it can be flagged down if the tweet is a potential cyber bullying threat.","PeriodicalId":254272,"journal":{"name":"2018 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}