{"title":"State of Art of Control Techniques adopted for Torque Ripple Minimization in Switched Reluctance Motor Drives","authors":"C. Keerthana, M. Sundaram","doi":"10.1109/ICOEI48184.2020.9143012","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143012","url":null,"abstract":"Switched Reluctance Motor (SRM) will have a reasonable space in future electric motor market due to its simple and robust construction. The doubly-salient pole structure of the SRM leads to some major disadvantages like torque ripple, vibration and acoustic noise. Torque ripple is one of the main issues which can be minimized either by modifying the geometrical design of the motor or by adopting various control strategies. Varying the geometrical design of the motor increases complexity of the machine. But the advent of modern power electronic devices helps in improving the complexity of the drive. Further research and development in SRM drive is essential. This paper provides a short overview of different control strategies adopted to minimize torque ripples in Switched Reluctance Motor Drives.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129497005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Visual Cryptography Scheme in Software Watermarking","authors":"Reetu Mariya Jacob, P. K, A. P","doi":"10.1109/ICOEI48184.2020.9142987","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142987","url":null,"abstract":"Software watermark is a unique identifier that is embedded in software that can be extracted later to prove the identity of the owner. Software is prone to threats like piracy, modification, and illicit use. In this technologically sophisticated period, software watermarking is necessary to authenticate ownership of the software. In the proposed scheme, collatz conjecture to embed the watermark is used and the input to collatz function is generated using a visual cryptographic scheme. The watermark value is split into different shares by the visual cryptographic secret sharing scheme. Instrumentation is done using sbt-instrumentation to extract the watermark. The advantage of this scheme is that it is flexible for any number of embedding points. This watermarking scheme is also resistant to model checking and watermarking attacks.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133859139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Locking Protocols in Database Management for Increasing Concurrency","authors":"Swati, Shalini Bhaskar Bajaj","doi":"10.1109/ICOEI48184.2020.9142943","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142943","url":null,"abstract":"Transaction performs lock and unlocking operations on the data items required in its execution. These operations on the data items are important in order to maintain consistency of the database as the data may be accessed by concurrently executing transactions. Designing locking and unlocking mechanism on the data items it involves fine tuning which involves the following factors a) level of granularity b) appropriate version to be locked c) supporting the compatibility mode. In this paper, two locking protocols are covered namely Multi version and Multi granularity locking protocol. The Multiple granularity locking protocol specify at which level locks can be applied, if the lock is applied on exact level of database, then definitely system performance can be improved and basically explore how can be increase the concurrency of MGL locking protocol by considering suitable example. An efficient locking technique is proposed by integrating multi version with multiple granularity in the hierarchical structure. This allows several requesting transactions to be executed in parallel by serving them an appropriate version to read while the write operation of some other transaction is in progress.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133978772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Defect Prediction Using Machine Learning Techniques","authors":"C. Prabha, N. Shivakumar","doi":"10.1109/ICOEI48184.2020.9142909","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142909","url":null,"abstract":"Software defect prediction provides development groups with observable outcomes while contributing to industrial results and development faults predicting defective code areas can help developers identify bugs and organize their test activities. The percentage of classification providing the proper prediction is essential for early identification. Moreover, software-defected data sets are supported and at least partially recognized due to their enormous dimension. This Problem is handled by hybridized approach that includes the PCA, randomforest, naïve bayes and the SVM Software Framework, which as five datasets as PC3, MW1, KC1, PC4, and CM1, are listed in software analysis using the weka simulation tool. A systematic research analysis is conducted in which parameters of confusion, precision, recall, recognition accuracy, etc Are measured as well as compared with the prevailing schemes. The analytical analysis indicates that the proposed approach will provide more useful solutions for device defects prediction.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134366813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Test Scheduling for Low Transition Reusable LFSR based BIST in 3-D Stacked ICs","authors":"Bandi Divya, N. Mohan","doi":"10.1109/ICOEI48184.2020.9143017","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143017","url":null,"abstract":"Test Scheduling is a major bottleneck in reducing the test time for 3D stacked ICs, as the test which can be applied simultaneously in pre-bond testing may have to be applied in a different cycle due to the impending resource constraint in the post-bond testing. In this paper, a reusable Low transition BIST for 3D stacked ICs are proposed which can schedule the tests in both pre-bond and post-bond testing. Furthermore, an Improved Skyline Algorithm is used to further organize the tests. The complete test scheduling framework was applied to various ISCAS-85 and 89 benchmark circuits. From the results, it could be observed that the pseudo-Random Generator used in BIST framework is driven by Reseeded-Bit-Swapping LFSR (RBS-LFSR) which has reduced the amount of switching power dissipated from the circuit up to 25%. The BIST designs were validated at different modes of operation and the area, power overhead due to BIST is found to be negligible. With the use of Modified Skyline Algorithm the test time approximately reduced up to 29%.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132628701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Social Network Trust With Respect To Big Data Analytics","authors":"A. S. Kumar, S. Revathy","doi":"10.1109/ICOEI48184.2020.9142970","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142970","url":null,"abstract":"In recent years, Online Social Networks (OSNs) have become a significant part of human lives. At present, Social Network connects various people who expose similar interests. Users develop explicit network systems to speak to their social connection. Users regularly transfer a lot of data associated with their own lives. The potential security dangers of such data are regularly belittled or overlooked on the issues in making sure about the information and security of users in cloud-based Social Network persevere and the users are unconscious of these issues. They share different pictures, recordings, and individual information on the systems administration site which avail considerably even after deleting. In any case, a portion of the data revealed is intended to be private, thus interpersonal information has prompted the danger of spreading of secret data of the people. Since progressively customized data is imparted to the public, disregarding the protection of the target user becomes a lot simpler. Thus, the security of the interpersonal information stored in the cloud is one of the major issues in cloud-based systems. This paper presents a survey on different models on guaranteeing security for sharing the information in the social network. It is proposed to develop a model in the future to ensure trust in the transfer of any data in the Social Network sites.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114195328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rony R. Alcala, Zuedmar G. Arceo, Jonathan N. Baterisna, Jimmy O. Morada, Julius Oliver D. Ramirez, R. Tolentino
{"title":"Design and Implementation of Body Wearable Device and Oculus Rift Controlled Panning and Aiming Sentry Gun Turret","authors":"Rony R. Alcala, Zuedmar G. Arceo, Jonathan N. Baterisna, Jimmy O. Morada, Julius Oliver D. Ramirez, R. Tolentino","doi":"10.1109/ICOEI48184.2020.9143032","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9143032","url":null,"abstract":"The article presents a study of design and implementation of pan movement to gun turret resulted in diminishing the range limitations of the gun turret. Gun turret is a mounted weapon which has a mechanism for firing projectile from inside and can aim and shoot its desired target within its range of operation. The proponents designed a gun turret that can move more than 360 degrees. The gun turret aiming is controlled by Oculus Rift DK2 while the added gun turret's pan movement is controlled by the body-wearable device. The proponents used MS Visual Studio for extracting and graphing of the data then used statistical methods to evaluate the response of the system. The acquired sensor's data from the Oculus Rift and body-wearable device was compared to the data of the sensors placed on the gun turret. The result shown that the gun turret design created can perform both aiming and panning movements. The proponents also concluded that the pan movement added to the gun turret system does not affect the aiming of the gun.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128525416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Avu Bharadwaj Reddy, Avula Koushik Sai, A. Sivasangari
{"title":"Non-Invasive Blood Glucose Level Monitoring Using IoT","authors":"Avu Bharadwaj Reddy, Avula Koushik Sai, A. Sivasangari","doi":"10.1109/ICOEI48184.2020.9142887","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142887","url":null,"abstract":"This electronic document is a “live” template which defines about one of the most challenging health issue in the 21st century which is known as DIABETES","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134110902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saikiran Subramani, Suhashine Sukumar, Zuber Ahmed, Vishaal Venkat, S. V, B. Geethanjali
{"title":"Analysing the Performance of Blood Pressure Parameters Using EMF Method","authors":"Saikiran Subramani, Suhashine Sukumar, Zuber Ahmed, Vishaal Venkat, S. V, B. Geethanjali","doi":"10.1109/ICOEI48184.2020.9142931","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142931","url":null,"abstract":"The measurement of Blood pressure for years has been done by the auscultatory method, where a trained person inflates a cuff around the patient and identifies the highest and lowest values of pressure during the cardiac cycle and there is a growing need to create awareness and have the right means to calculate blood pressure. The idea is based on the principle of magnetic blood flow meter and when the arm placed inside the region of the magnetic field there is an EMF produced due to the flow of blood in the artery. The output of this stage is fed into the signal conditioning circuit and the final systolic and diastolic blood pressure values are obtained with maximal accuracy. The results were analyzed with the traditional sphygmomanometer and the digital sphygmomanometer which indicates that when miniaturized into compact models the device can measure blood pressure continuously and non-invasively and is capable of replacing the current cuff method as the accuracy of the device is maintained and errors were also in the tolerance range with minimal contact with the patient's skin.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129326827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shivam Mehta, Aarohi Mahajan, S. Chitale, Dhananjay Raut
{"title":"BirdEview: Advance version of call monitoring system by using mining techniques","authors":"Shivam Mehta, Aarohi Mahajan, S. Chitale, Dhananjay Raut","doi":"10.1109/ICOEI48184.2020.9142928","DOIUrl":"https://doi.org/10.1109/ICOEI48184.2020.9142928","url":null,"abstract":"The main objective is to ensure the standards of every call center for its performance, services and get insights into customer's emotions involved with the company using different data mining techniques. As the call center is the second most important thing just after the actual product it becomes very important to deal with the agent's performance and different methodologies to improve services and decrease the volume of the call flow by improving services. To achieve this, have to make sure that the agent is performing his/her task appropriately and to validate Text mining will be used to be able to monitor every call made or received by an agent. The ability to get customer's emotional insights for every issue raised by customers and escalated by the agents and these issues will be termed as Focus points. Interaction mining will be the technology used for extracting emotional insights. So firstly when agents make an outbound call to the customer or will receive an inbound call by the customer, Speaker diarisation is used to solve the problem of who spoke when during the call to perform data mining techniques live, by converting speech to text for text mining and use emotion analysis for interaction mining. After converting speech to the text, different key-points are compared and the customer's emotional input to generate a report for every call.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116125605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}