2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)最新文献

筛选
英文 中文
Microfluidic analysis of micro needle array for drug delivery applications 微针阵列的微流控分析在药物输送中的应用
D. Lingaraja, S. Praveen Kumar, T. Aravind, T. K. Srinivasan, S. Ramya, G. Ram
{"title":"Microfluidic analysis of micro needle array for drug delivery applications","authors":"D. Lingaraja, S. Praveen Kumar, T. Aravind, T. K. Srinivasan, S. Ramya, G. Ram","doi":"10.1109/DISCOVER55800.2022.9974694","DOIUrl":"https://doi.org/10.1109/DISCOVER55800.2022.9974694","url":null,"abstract":"In this paper, we design and analyze a mechanical bi-leaflet valve to replace the damaged valve using Nickel-Titanium (NiTi) a shape memory alloy created using COMSOL multiphysics software with 60-150 mmhg as input pressure to the valve is tested against the displacement and stress is noticed in the valve. There by loweringIn this paper, microneedles array based on out-of-plane for a transdermal drug delivery system was investigated structurally and microfluidically. There has been an upswing in studying the materials and production procedures for microneedles which promise nearly painless penetration through the skin. A single tip of a microneedle was constructed and the tip was developed into 36 microneedles array. The analysis and simulation of the microneedle were carried out using COMSOL Analysis (FEM) as a tool to determine the effect of the axial and transverse loads induced during the insertion of the microneedle into the skin and the results were presented. In order to examine the pressure distribution of fluid over a 36-microneedle array, a static analysis was performed. We acquired the 36 array of needles as a patch that it completed the purpose of enabling the fluid reaches the specified location. It also prevents any potential discomfort during the implantation. the chance of backflow of blood. The displacement and stress distribution parameters were analyzed. For the applied pressure 140mmhg which is equivalent to the normal pressure. From the obtained results, it is clear that the designed actuator is highly optimized structure to prevent the patient from heart attack.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133078899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Security for IoT Devices using Software Defined Networking (SDN) 使用软件定义网络(SDN)增强物联网设备的安全性
S. Anand, An Ganeshwari
{"title":"Enhancing Security for IoT Devices using Software Defined Networking (SDN)","authors":"S. Anand, An Ganeshwari","doi":"10.1109/DISCOVER55800.2022.9974896","DOIUrl":"https://doi.org/10.1109/DISCOVER55800.2022.9974896","url":null,"abstract":"Software Defined Networking (SDN) help for networking design which aims to deal with association and control flexibility. SDN is associated with the open stream and ODIN V2, which is used for long-distance correspondence in general. Its strategy is central, deft, and well-organized. With the advent of reasonably speed internet and common calculating processors, people now have the ability to access an original atmosphere of opportunities and challenges at their fingers. This most recent start of innovation has impacted areas such as education, organization, business, clinical, and corporate settings. This introduction of IoT, the number of connected devices will be greater than at any point in recent memory. These threats are designed to tamper with the information’s dependability, infiltrate various initiatives in order to spread farther, and to profit financially Ransomware has recently become the most well-known virus that has made headlines. This type of malware infection encrypts client explicit documents and demands a payment in exchange for their retrieval. Programming characterized organizing, or SDN, is the smoothing out and centralization of large commercial network organization. The most typical benefits of SDN can be described with traffic programmability, readiness, and the ability to support strategy-driven for checking the network and send network robotization. Programming projects can use an organization engineering method to supervise and organize the organization in a thoughtful and halfway manner. This allows administrators to deal with the entire company uniformly and exhaustively, regardless of the hidden organization innovation. Current ransom ware behavior shows the infection spreading from the host victim to other PCs and shared drives inside the company. This document offers a point-by-point analysis of ransomware and the malware’s flow patterns. The time taken for Crypto Wall ransomware encryption using AES is measured for various data volumes, and an SDN strategy for ransomware risk mitigation is discussed.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122545463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANN Based Weather Analysis and Prediction 基于人工神经网络的天气分析与预报
N. Balaji, Shreejan B Bhandary, Rodney Francis Dsouza, B. K. Karthik Pai
{"title":"ANN Based Weather Analysis and Prediction","authors":"N. Balaji, Shreejan B Bhandary, Rodney Francis Dsouza, B. K. Karthik Pai","doi":"10.1109/DISCOVER55800.2022.9974773","DOIUrl":"https://doi.org/10.1109/DISCOVER55800.2022.9974773","url":null,"abstract":"Weather has always been an unpredictable factor and this affects the day to day lives of ordinary people. In order to make life easier it’s always a better way to know the weather conditions in advance, to act or plan the day or next accordingly. Many Artificial Intelligence (AI) techniques available can be used to train the model to predict the results. The more advanced the model, the more accurate are the results. In this model we are using LSTM and Bi–LSTM to predict the weather based on obtained datasets. The datasets are obtained from around the world, which means Australia, Bangladesh, Austin Texas, Jenna Germany. We preprocess the data before performing LSTM and Bi – LSTM algorithms on it and find out the accuracy through Mean Absolute Error and Root Mean Squared Error and compare the algorithms results in predicting the temperature.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128841537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Test Vector Generation and Sensitivity Analysis for Hardware Trojan Detection in Compact Rare Nodes 紧凑稀有节点硬件木马检测的测试向量生成及灵敏度分析
G.S Kavya Patel, S. Ramesh, Devi M. Nirmala
{"title":"Test Vector Generation and Sensitivity Analysis for Hardware Trojan Detection in Compact Rare Nodes","authors":"G.S Kavya Patel, S. Ramesh, Devi M. Nirmala","doi":"10.1109/DISCOVER55800.2022.9974745","DOIUrl":"https://doi.org/10.1109/DISCOVER55800.2022.9974745","url":null,"abstract":"Hardware Trojans (HT) emerged as a significant threat to Integrated Circuits (IC) industry that require security and trustworthiness in systems. Detecting HT has become very challenging due to the diversity of Trojans and unpredictable process variations during fabrication. This work presents a test vector generation approach to improve the trojan detection process. The proposed approach tries to trigger the compact rare nodes. The nodes of digital circuit are compact, in which the transition probability is less and has high controllability and observability values are considered as compact. Since, these nodes are the potential point for Hardware Trojan insertion for attackers. Thus, our objective is to trigger those compact rare nodes and change the critical path with compact test patterns to make it very efficient in uncovering the malicious trojan added by attackers utilizing one of the side channel parameters - delay. The experimental results of the proposed method are analyzed using ISCAS’85 benchmark circuits and it shows that trojan detection can be achieved with reduced number of nodes and test vectors.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116082991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Prognostic Reasoning Model for Improving Areacanut Crop Productivity using Data Analytics Approach 利用数据分析方法提高花生产量的预测推理模型
P. Rithesh Pakkala, B. Shamantha Rai
{"title":"A Prognostic Reasoning Model for Improving Areacanut Crop Productivity using Data Analytics Approach","authors":"P. Rithesh Pakkala, B. Shamantha Rai","doi":"10.1109/DISCOVER55800.2022.9974945","DOIUrl":"https://doi.org/10.1109/DISCOVER55800.2022.9974945","url":null,"abstract":"A proactive decision-making process relies heavily on prognostic reasoning models. Due to the evolving agronomic conditions, prognostic reasoning models are now required in the agricultural sector for risk management and to increase the productivity of the most important plantation crops. The major goal of this study is to maximize areca nut crop productivity by identifying various combinations of the best features using the formal statistical test chi-square. By giving the questionnaires to the farmers growing the Arecanut crop in the Mangaluru area of Karnataka, the study’s real data set is created. The Nave Bayes, Random Forest, Logistic Regression, and Decision Tree classifiers are used to evaluate the best features discovered by the chi-square test. With a prediction accuracy of 99.67%, it has been discovered that the random forest outperforms other classifiers when it comes to crop yield.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127211534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
DoA Detection Under Heavy Noise and Fading 重噪声和衰落下的DoA检测
F. Morab, Rajeshwari Hegde, Veena Hegde
{"title":"DoA Detection Under Heavy Noise and Fading","authors":"F. Morab, Rajeshwari Hegde, Veena Hegde","doi":"10.1109/DISCOVER55800.2022.9974636","DOIUrl":"https://doi.org/10.1109/DISCOVER55800.2022.9974636","url":null,"abstract":"Incoming electromagnetic message signals are received by the Base Station (BS) with antenna geometry setup as a Uniform Linear Array (ULA) configuration, and the desired users are detected by computing their Direction of Arrival (DoA). The presence of fading and noise makes the detection process more challenging. Thus to accomplish this, Triangular Decomposition DoA (TD) Method has been proposed, which is modeled as a vector subspace method. Whether the spatial distance between the users is far or near, or when the system is using either large or fewer antenna elements, the proposed TD method provides optimal detection of the desired users. The existing methods were compared with the proposed method for different use cases. The proposed TD Method detected the desired users with a very high-resolution detection of 2-degree spacing between the users whereas, existing methods could detect only up to 5-degree spacing under the erratic conditions of the channel. The different performance parameters were computed such as Time Complexity and Detection Error to test the robustness and accuracy of these algorithms. The proposed TD method delivered the best results consistently as compared to the existing methods.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Toxicity in MultimediaMessages for Controlling Cyberbullying on Social Media by Natural Language Processing 自然语言处理对控制社交媒体网络欺凌的多媒体信息毒性的识别
V. Nithyashree, B. Hiremath, L. Vanishree, Aparna Duvvuri, Disha Anand Madival, G. Vidyashree
{"title":"Identification of Toxicity in MultimediaMessages for Controlling Cyberbullying on Social Media by Natural Language Processing","authors":"V. Nithyashree, B. Hiremath, L. Vanishree, Aparna Duvvuri, Disha Anand Madival, G. Vidyashree","doi":"10.1109/DISCOVER55800.2022.9974631","DOIUrl":"https://doi.org/10.1109/DISCOVER55800.2022.9974631","url":null,"abstract":"Speaking hatefully is an antisocial conduct. Hate can be expressed on the basis of gender, race, or religion, ethnic, etc. The definition of “hate speech” is ambiguous. The Hate speech is defined by the Council of the European Union as “any types of expression which disseminate, provoke, or defend intolerance as a reason for racial hatred, xenophobia, antisemitism, or other types of hatred, including violent nationalism and ethnocentrism, as well as prejudice and hatred toward migrants, minorities, and those with immigrant backgrounds. The most pressing issue in recent times in social media and online groups is toxicity identification sites for networking. Therefore, it is necessary to create an automatic hazardous identification system to keep people out of and restrict their access to these online settings. The prevalence of hate speech presents significant difficulties for the cyber culture. Users can wish for social media sites and online forums to support anti-hate discourse. Hate speech detection, however, is still a young technology, and system designers must come up with a way to identify unwanted hate speech while upholding the atmosphere of online freedom of speech. No method for detecting excellence has yet been put forth. Identifying the form of communication is hate speech and automatically recognising the hate speech are the two typical obstacles for a hate speech detection task. People must first decide which kinds of speech fall under the category of hate speech before screening it out. The majority of social media platforms define hate speech differently. In this day and age, Internet is necessary, and ethics has to be followed, however several parties spread hate speech deviating on race, ethnicity, and religion. The user’s freedom and anonymity increase the harassment by hate speech. It also adds lack of regulation on social media communication. Cyber bullying and trolling are two kinds of abusive behaviour.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123685273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Vison Based Lane Detection Approach Using Vertical Lane Finder Method 基于视觉的垂直车道检测方法
S. D. Vidya Sagar, C. J. Prabhakar
{"title":"A Vison Based Lane Detection Approach Using Vertical Lane Finder Method","authors":"S. D. Vidya Sagar, C. J. Prabhakar","doi":"10.1109/DISCOVER55800.2022.9974938","DOIUrl":"https://doi.org/10.1109/DISCOVER55800.2022.9974938","url":null,"abstract":"This paper presents a novel approach for detection of lane using Kirsch operator and VLF method. The problem of detecting lane using vision sensors poses many problems such as atmosphere of the road, traffic intensity on the road, pollution, shadow of a tree, and other objects on the road. Normally, in any roads, the lanes are colored with yellow and white with different purpose. To highlight yellow and white lanes in a given RGB image, conversion from RGB to HSL and RGB to HSV is performed. The Gaussian filter is employed to smooth the image and to remove the noise, followed by edge detection using Kirsch operator. After edge detection, to retain only candidate lane lines in edge map, we compute the orientation of gradient and select the pixels which are representing candidate lanes. Finally, a VLF method is used to detect lanes in the image. The experiments are conducted using KITTI benchmark dataset and results are evaluated using popular metrics. Through experiments we demonstrate that detection of lane using proposed method yields promising accuracy.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123740142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open-source Hardware: Different Approaches to Softcore implementation 开源硬件:软核实现的不同方法
Sneha M Hiremath, Satyadhyan Chickerur, Joel Dandin, Mihir Patil, Bhoomi Muddinkoppa, Shreerama Adakoli
{"title":"Open-source Hardware: Different Approaches to Softcore implementation","authors":"Sneha M Hiremath, Satyadhyan Chickerur, Joel Dandin, Mihir Patil, Bhoomi Muddinkoppa, Shreerama Adakoli","doi":"10.1109/DISCOVER55800.2022.9974836","DOIUrl":"https://doi.org/10.1109/DISCOVER55800.2022.9974836","url":null,"abstract":"Since the last few years, open-source hardware is preferred in the landscape of hardware development. Originally proprietary hardware was only developed by big multinational companies like AMD, Intel, and NVIDIA, which were expensive and general-purpose. Due to this, people started developing their own hardware. Open-source hardware has support from the opensource community, is developed at low cost, and has presently got a lot of support from developers and enthusiasts. Softcore is a microprocessor that can be implemented on FPGA using logic synthesis and can be fabricated as open-source hardware. This paper focuses on how various approaches to softcore implementation can be done on FPGA which would involve logic cells, CLBs, LUTs, RAM, etc. The soft cores which are built upon the RISC-V ISA, namely VexRISCV and RISC-V BOOM, as well as the softcores adhering to the POWER ISA, such as Microwatt and LibreSoC, are the main topics of discussion. These softcores are installed and simulated. To test the working of the ISA, some standard test cases and test suites are executed. Hardware implementation is done by porting the softcore onto a Xilinx Nexys A7-100T FPGA board.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133423987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An experimental study on modification of oxygen concentrator components for better purity 对氧浓缩器部件进行改性以提高纯度的实验研究
Tarun S Nair, Sriram Vijaya Kumar, M. Harikumar, C. Santhosh Kumar
{"title":"An experimental study on modification of oxygen concentrator components for better purity","authors":"Tarun S Nair, Sriram Vijaya Kumar, M. Harikumar, C. Santhosh Kumar","doi":"10.1109/DISCOVER55800.2022.9974830","DOIUrl":"https://doi.org/10.1109/DISCOVER55800.2022.9974830","url":null,"abstract":"During the covid time, it was observed that the need for oxygen was very high, and this need was not achieved just by the oxygen cylinder. Ordinary people and hospitals started using oxygen concentrators to meet these needs. This paper focuses on improving the purity and the output flow rate of the oxygen concentrator. Different modifications were made by varying the number of air pores and filter count. Also, the compressor parameters like bore size, length, and flapper counts have been modified to increase the airflow concerning a liter per minute (LPM). The solenoid valve was configured to give maximum efficiency. Following the process, different Zeolite combinations were used to find the optimum purity of the oxygen concentrator. These modifications to the concentrator setup enabled 91.3% pure oxygen generation with an increase in the flow rate of the concentrator by 20%.","PeriodicalId":264177,"journal":{"name":"2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114615871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信