{"title":"Impact of tunneling length on analog/RF performance of L-shaped TFET","authors":"Prabhat Singh, Dharmendra Singh Yadav","doi":"10.1109/icacfct53978.2021.9837344","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837344","url":null,"abstract":"The influence of technological downscaling significantly escalate the vulnerability of semiconductor based devices. The influence of tunneling length variation on the performance of single gate SiGe-based (for source region) L-shaped TFET (SiGe-SGL-TFET) are examined in terms of channel length present between the source and gate oxide (Lateral tunneling length (LT)). This research work carried out to analyze the influence of various LT values on the bending of band at SCJ (source channel junction), Electric field, ON-state current (Ion), ON-voltage (Von) and sub-threshold swing (SS). In addition, the effect of LT variation on analog and high frequency FOMs (figure of merits) also analyzed. SiGe based SGL-TFET shows optimum performance when LT set to 3nm. The Von of proposed device increased as LT increases from 3nm to 9nm. Simulation results show that, enhanced analog/RF FOMs achieved for 3nm LT .","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122475362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of Retinal Image Classification-Techniques and Challenges","authors":"Akanksha Bali, V. Mansotra","doi":"10.1109/icacfct53978.2021.9837371","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837371","url":null,"abstract":"Retinal image classification has been into existence since decades. However, the biomedical industry has suffered over benchmark accuracy datasets. The availability of good quality data points is one of the main reasons for the absence of complete automation in retinal image processing. In this paper we try to delineate the different architectures utilised in retinal image processing. The utility of transformer in transplant techniques for data creation and classification is widely recognized. Finally, we compare different models and analyse their merits and demerits. The paper aims to not only provide a literature survey for all the different mechanisms available, but also put forth the promising areas for tomorrow.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"390 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114370000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breast Cancer Detection using Principal Component Analysis and Machine Learning Models","authors":"Sarthak Sanjay Tilwankar, B. Kirar","doi":"10.1109/icacfct53978.2021.9837342","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837342","url":null,"abstract":"Breast cancer is one of the major problems in women. It accounts at least 14% in Indian women. It is a most common form of cancer in women. Breast cancer is spreading in rural as well as urban areas. Approximately, 87,090 deaths and 1,62,468 new cases are reported in the year 2018. Breast cancer detection at an early stage and diagnosis can increase the lives of women. Our work deals with a breast cancer detection system that facilitates user to detect breast cancer using principal component analysis (PCA) and machine learning models (MLMs) based on the features of the data. Five different models are trained and tested to determine which model gave the highest accuracy on the data. The obtained accuracy, precision, sensitivity, and F-Measure are 97.53%, 97.59%, 95.75%, and 96.66%, respectively. The proposed method gave accurate and effective results compared to existing methods. Thus, this provides an effective application of machine learning models in the field of healthcare.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124889523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedding and Retrieving the Audio File using Audio Steganography","authors":"Anju Gera, Vaibhav Vyas, Pawan Kumar Singh","doi":"10.1109/icacfct53978.2021.9837369","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837369","url":null,"abstract":"Audio Steganography is a system used to transmit secret data by altering a sound signal in an intangible way. In this approach, the hidden audio is embedded within a cover audio that is the same size as the secret audio. This paper implements audio steganography along with the Least Significant Bit (LSB) method for secure information. Audio information hiding is one of the best methods to secure the message. This paper focused on two phases. The first part gives the steps the minimum significant bits of the carrier signal to place the data, and the next section gives the steps for building-in hidden data. This method contributes to increased concealment and security.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122297195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dheresh Soni, Vipin Tiwari, Bhupinder Kaur, M. Kumar
{"title":"Cloud computing security analysis based on RC6, AES and RSA algorithms in user-cloud environment","authors":"Dheresh Soni, Vipin Tiwari, Bhupinder Kaur, M. Kumar","doi":"10.1109/icacfct53978.2021.9837360","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837360","url":null,"abstract":"In this paper a cloud computing security analysis based on RC6, AES and RSA algorithms in client-cloud environment has proposed. This framework is divided in 2 phases. Data pre-processing is first phase applied based on the weight assigned. Based on the data values obtainable from the uploaded textual file in cloud environment weight assigned is calculated. Now in second phase fuzzy c-means has been applied in cloud on the uploaded data for clustering. First the score in terms of aggregated assessment ranking have been calculated based on simple additive weighting (SAW). Then the decision performances have been arranged. Different random sets of data values have been obtained and also the aggregated values have been obtained. These aggregated sets will determine the security operation and the risk associated with the data uploaded with the cloud environment. The maximum key unpredictability and validation shows the privileged security in terms of the elevated threat opportunity. Proposed automated FCM based clustered and multi layer security standard algorithms have potential to deal with multifaceted security.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126426184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 4-bit Barrel Shifter Design using Diverse Logic Style","authors":"Priyanka Tiwari, Amit Kumar","doi":"10.1109/icacfct53978.2021.9837367","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837367","url":null,"abstract":"Very–low-power CMOS IC design is needed for any communication systems. The system’s performance is measured in terms of less power dissipation, small delay and small area. In ALU design we use Shift resisters to perform the addition, multiplications, shifting and floating point arithmetic. Shift resistors are made up of flip flops, in which n clock pulses are required for n shifts. We can use Barrel Shifters instead of shift resistors, which requires only one clock pulse for n shift. In this paper I designed a 4-bit Barrel Shifters using Static CMOS, TGL and PTL. And measured the performance depend on the parameters like delay and power consumed. Analysis is done in cadence virtuoso tool at 45nm technology.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122961075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis on Grid Connected Roof Top Solar PV System using PV Syst Software","authors":"Aashwin Prasad, O. Singh","doi":"10.1109/icacfct53978.2021.9837115","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837115","url":null,"abstract":"This paper focuses on the analysis of the solar photovoltaic (PV) modules, their installation scheme, and inverters installed on the rooftop solar power plant of School of Engineering (SOE) at Gautam Buddha University, Greater Noida, Uttar Pradesh, India. A counting of the equipment installed has been done, their actual output has been recorded and the outputs have been compared with those of a simulated model created using PVsyst software.PVsyst software has been used to determine the optimality of the installation of equipment, output of the power-plant and thereafter, a comparison of the simulated model has been done with the actual installed equipment. Finally, the discrepancies between the results obtained by the simulated model vis-à-vis actual installed components through Tables and resolution have been attempted. The solutions for efficiency improvement have also been suggested in the concluding portion of the paper.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129054794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramkrishna Patel, Vikas Choudhary, D. Saxena, Ashutosh Kumar Singh
{"title":"LSTM and NLP Based Forecasting Model for Stock Market Analysis","authors":"Ramkrishna Patel, Vikas Choudhary, D. Saxena, Ashutosh Kumar Singh","doi":"10.1109/icacfct53978.2021.9837384","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837384","url":null,"abstract":"The stock market prices change everyday by market forces (supply and demand). In recent years stock market forecasting becomes a successful approach to predict stock prices. Investors are investing in the stock market based on certain predictions. For guiding stock market investors, this research paper proposes a NLP and LSTM based forecasting model for stock market. According to our research, we found a strong bond between social media news and historical data. An algorithm is proposed for sentimental analysis to establish the correlation between the stock market values and the sentiments in news feed. In our model we have utilized two different methods Natural language processing (NLP) for the feature extraction and Long Short-Term Memory (LSTM) for training our dataset. The simulated experiment based performance evaluation and comparison of the proposed model outperformed the state-of-the-arts by achieving high prediction accuracy by reducing the mean square error up to 0.062.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127269452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FCSM: Fuzzy Cloud Selection Model using QoS Parameters","authors":"Mohammad Faiz, A. Daniel","doi":"10.1109/icacfct53978.2021.9837347","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837347","url":null,"abstract":"The global demand of web users for Cloud computing in the various public domain has gained tremendous attention for the Cloud service providers (CSP) to satisfy the specifications of different Cloud users. A number of challenges such as migration of data from one Cloud to another, dynamic demand handing of Cloud resources, allocation of suitable Cloud to the Cloud users are the key challenges of Cloud computing that can reduce the computing capabilities offered by the Cloud. The adoption of the Cloud has spurred competition among CSPs because each CSP provides cloud services at varying costs and with varying options. To improve the Quality of Service (QoS) experience of Cloud users and overcome the challenge of choosing a suitable Cloud to meet the specific requirements of users in different applications, a Fuzzy Cloud Selection Model (FCSM) is proposed with different selection parameters.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125672320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aspect Based Sentiment Analysis Using Rule Based Approach","authors":"Vudatha Usha, K. Prema","doi":"10.1109/icacfct53978.2021.9837338","DOIUrl":"https://doi.org/10.1109/icacfct53978.2021.9837338","url":null,"abstract":"There is an immense measure of media information like overpowering news and different pictures that can be effortlessly acquired from the Web, which thus has brought about an extraordinary challenge of consequently grouping, breaking down, and summing up the information. The analysis not just performs seriously over conventional methodologies as far as point demonstrating and archive order, yet additionally can recognize the discriminative force of each word regarding its relegated theme. The fundamental thought hidden is to encode the interchange among points and discriminative force for the words in the reports in a managed way to such an extent that which will be helpful and can likewise be applied in different fields with huge results. The estimation of the info is controlled by thinking about different components. In this work, we proposed an algorithm using rule-based approach for sentiment analysis and also additionally applied POS tagging in Pre-preparing interaction of the information. We used python coding language to implement the algorithm as it has required bundles and modules for analysis. The frontend part is planned utilizing HTML including featured sentences, emojis, gif to depict the emotion of the input. According to the analysis, the proposed algorithm outperforms well in predicting the sentiments of the sentences and takes very less time period for analysis.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}