2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)最新文献

筛选
英文 中文
IoT-based Automated Pond Water Quality Monitoring System for Aquaculture Farms 基于物联网的水产养殖场池塘水质自动监测系统
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00050
A. Menon, M. Prabhakar
{"title":"IoT-based Automated Pond Water Quality Monitoring System for Aquaculture Farms","authors":"A. Menon, M. Prabhakar","doi":"10.1109/INDIACom51348.2021.00050","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00050","url":null,"abstract":"Owing to the modern-day development in agricultural and aquacultural fields of a country, there has been a great need for the automation of various tasks associated with these fields for obtaining maximum progress. The proposed Internet of Things (IoT) based System in this paper works on Arduino development board and its sensors for obtaining a real-time cost-effective monitoring system. The data is gathered from each section of the pond at a timed interval for accurate results and sent as a Short Message Service (SMS) using a Global System for Mobile Communications (GSM) module to the culturist's mobile. The SMS will include details of all the parameters analysed at each section of the pond at that particular interval of time as well as the warning specifying values of parameters exceeding the permissible levels. The System is provided power using Solar Panel of suitable voltage to ensure that device does not require manual charging. Information exchange between the system and user is based on GSM technology due to the unavailability of efficient and fast Wireless Network access in remote regions. Hence automation of the system's data collection and maintenance is made possible. This system provides real-time notifications to the culturist and helps in preventing the pond parameters from fluctuating to a dangerous level that affects the mortality rate of the organism. The parameter levels may now be controlled as quickly as possible thereby reducing stress on the organism's environment and its effects on the organism's growth rate.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122093014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Underwater Acoustic Pressure Sensing using Optical Fiber Bragg Grating 基于光纤布拉格光栅的水声压力传感
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00103
Hareesh Kumar, A. Sharan, M. SreeRangaRaju
{"title":"Underwater Acoustic Pressure Sensing using Optical Fiber Bragg Grating","authors":"Hareesh Kumar, A. Sharan, M. SreeRangaRaju","doi":"10.1109/INDIACom51348.2021.00103","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00103","url":null,"abstract":"A large amount of untapped resources lies underwater, which covers almost 70% of the surface of the earth. Therefore, there is a need to monitor the underwater behavior and operations occurring inside seawater by developing a robust and mature technology. Acoustic signals are capable of long-range detection with significantly less latency (due to underwater speed of sound). This paper presents the designing and simulation of an Optical Fiber Bragg Grating (OFBG) sensor. OFBG has properties such as immunity to electromagnetic interference, remote sensing, stability in harsh environments. OFBG sensors are in use in an environment where conventional sensors are unsuitable because of the capabilities such as multiplexing, high sensitivity, and wide dynamic range. Mostly the OFBG sensor is in use to measure pressure, stress, and strain change by observing a shift in Bragg's wavelength caused by natural calamity, presence of a variety of aquatic creatures, and anti-submarine movements. GratingMOD design tool is in use for analyzing and synthesizing complicated grating profiles. During the simulation, the highest-pressure variation considered is 39.81 MPa (undersea earthquake) to lowest 0.56KPa (Right Whale) to observe strain and stress on the sensor. The underwater activity created stress/strain resulting in Bragg's wavelength shift towards the Direction of Arrival (DOA) of the acoustic signal. The recorded wavelength change for Undersea Earthquake is 1560.86241(nm), Right Whale is 1550.000153(nm).","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124042252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware and Software Solution for Preserving Privacy of Mobile Devices and their Applications 保护移动设备及其应用程序隐私的硬件和软件解决方案
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00069
Abdullah M. Basahel, Adnan Ahmed Abi Sen, Mohammad Yamin, N. Bahbouh
{"title":"Hardware and Software Solution for Preserving Privacy of Mobile Devices and their Applications","authors":"Abdullah M. Basahel, Adnan Ahmed Abi Sen, Mohammad Yamin, N. Bahbouh","doi":"10.1109/INDIACom51348.2021.00069","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00069","url":null,"abstract":"Smartphones have become one of the basic necessities for everyday life. People spend a lot of their time on smartphones to browse the internet, chat, listen to music, play games, watch movies, and even do job related processing. One of the most important challenges and problems of smartphones is protecting the privacy of users. As we know, we now have billions of applications, many of which attract a large number of malicious applications that can monitor mobile phone users and discover a lot of their sensitive and confidential information. This research proposes a minor modification in the design of the software and hardware of smart phones, to ensure stronger protection for the user from any malicious application, even from the manufacturer of the device. The idea is based on building a physical lockout mechanism for some of the sensored devices, such as the camera and microphone, in addition to relaying alerts, and forcing user to accept requests before accessing any information. Acceptance of user requests is forced by overriding predefined permissions, which are usually difficult to track and manage. The research also provides an overview of a specialized platform which can easily assess the credibility of applications which exhibit strange behavior. We provide the details of the method, with simulation, for realising the suggested ideas into practice. We also discuss the benefits of the proposed improvements in the level of privacy and security, compared to the current situation.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127213935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creating Domain based Dictionary and its Evaluation using Classification Accuracy 基于领域的词典创建及其分类精度评价
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00059
Mansi Sood, Harmeet Kaur, Jaya Gera
{"title":"Creating Domain based Dictionary and its Evaluation using Classification Accuracy","authors":"Mansi Sood, Harmeet Kaur, Jaya Gera","doi":"10.1109/INDIACom51348.2021.00059","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00059","url":null,"abstract":"This paper creates a domain-based dictionary for different categories in the news domain. It extracts terms - unigrams and collocations (specifically bigrams and trigrams) to construct the dictionary. The created dictionary is then used to classify unseen news data. The paper studies how variation in two parameters - (i) occurrence frequency of extracted terms and (ii) window size of extracted bigrams impact the dictionary size and the classification accuracy. Subsequently, dictionary size and classification accuracy are analyzed by creating dictionaries comprising of just unigrams, bigrams, trigrams, or their combinations. A reasonably sized and accurate dictionary can be created using just bigrams. The inclusion of trigrams to the dictionary accounts for a slight accuracy gain. Including both unigrams and bigrams in the dictionary can achieve a high accuracy score with a significantly smaller dictionary size than adding just unigrams or bigrams to the dictionary. Also, the trio combination adding unigrams, bigrams, and trigrams to the dictionary does not lead to a significant increase in accuracy. These observations will help in creating a meaningful and compact dictionary.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129089666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Emphasis on Evaluative Prerequisites for Decisive Software-in-the-Loop (SiL) Environments 强调决定性软件在环(SiL)环境的评估先决条件
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00080
Kushal Koppa Shivanandaswamy, Chandrima Sarkar, Sivakumar Rajagopal, Lakkappa Pisutre Ramachandra, Chiranjeevi Manchasandra Chayakumar
{"title":"Emphasis on Evaluative Prerequisites for Decisive Software-in-the-Loop (SiL) Environments","authors":"Kushal Koppa Shivanandaswamy, Chandrima Sarkar, Sivakumar Rajagopal, Lakkappa Pisutre Ramachandra, Chiranjeevi Manchasandra Chayakumar","doi":"10.1109/INDIACom51348.2021.00080","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00080","url":null,"abstract":"Recent trends in virtualization have shown significant desideratum, for the simulations to be performed using credible SiL environments. The SiL environment is a plausible approach, which is decisive in verifying the complex control algorithms, embedded into various automotive ECUs. Major challenges would be associated with the approaches, processes, and manipulation of risks, in the course of the development of credible SiL environments. The need for a competent mitigation plan is required, which might postulate a paradigm shift in the software development processes. This is quintessentially required for the development of an effective, reliable, and credible SiL environment. With different approaches and processes, currently, for different SiL environments, created using different tools, from different vendors, emphasis on the evaluation of the standard set of prerequisites is very much necessary. The evaluation provides technical clarity and aids in the process of vECU generation, with a significant impact on the implementation of a credible SiL environment. This decisive SiL environment thus enables verifying & validating the vECU behavior and performance. In this paper, we provide insights into the evaluative prerequisites, considered before the creation of the SiL environment. The evaluation of these prerequisites is imperative in identifying and selecting the software components and evaluating its available information, integrated as part of vECU. With the help of use-cases, we try to highlight and emphasize the imperative prerequisites, evaluated, and the need for its evaluation, in creating a credible SiL environment.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127581553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Denial of Service Attack Detection using Deep Learning Approaches 使用深度学习方法的分布式拒绝服务攻击检测
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00087
Meenakshi, Krishan Kumar, Sunny Behal
{"title":"Distributed Denial of Service Attack Detection using Deep Learning Approaches","authors":"Meenakshi, Krishan Kumar, Sunny Behal","doi":"10.1109/INDIACom51348.2021.00087","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00087","url":null,"abstract":"In this paper, the Deep Learning based approaches (Convolutional Neural Network and variants of Recurrent Neural Networks, i.e. Long Short-Term Memory, Bidirectional Long Short-Term Memory, Stacked Long Short-Term Memory and Gated Recurrent Units) have been used to detect Distributed Denial of Service (DDoS) attacks. The Deep Learning approaches have been evaluated using the Portmap.csv file of recent DDoS dataset, i.e. CICDDoS2019. Before giving input to the Deep Learning approaches, the data is pre-processed. The Deep Learning approaches are trained and tested using the pre-processed dataset. The reporting results show that RNN based Stacked-LSTM Deep Learning approach produces the best results in detecting Portmap DDoS attack in comparison to other Deep Learning based algorithms.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131422083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Smart Street Design for Managing Crowds in Hajj 管理朝觐人群的智慧街道设计
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00067
Adnan Ahmed Abi Sen, Yazed Alsaawy, A. Alkhodre, N. Bahbouh, Mohamed Alhaboob
{"title":"Smart Street Design for Managing Crowds in Hajj","authors":"Adnan Ahmed Abi Sen, Yazed Alsaawy, A. Alkhodre, N. Bahbouh, Mohamed Alhaboob","doi":"10.1109/INDIACom51348.2021.00067","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00067","url":null,"abstract":"Hajj is an annual pilgrimage to Makkah in Saudi Arabia where over two and a half million pilgrims attend. It is one of the most intense crowded events in the world. Unfortunately, Hajj has witnessed several stampedes, fires and other disasters, which have led to the death of thousands of people. In recent years, the hajj management has made several improvements in the infrastructure, which has helped ease congestion in crowded rituals. However, despite the great development and huge contributions in improving the infrastructure of the facilities, the problem of crowd control and congestion still remains a real challenge to the management. Although crowd management during hajj is exemplary, it still remains largely manual. This research proposes an innovative solution by designing digital smart streets based on cheap LED-light screens, and control algorithm in addition to distributed fog nodes, wireless network sensors, and servers for the main computing and management. The proposed system will facilitate the process of controlling crowds, and the way it will function with the help of special signals and colors. These signs and instructions can be quickly and easily followed and adopted by people within the crowd. In this way, crowd management would be able to provide a prompt response to the requests and alerts from the central command. We use many techniques to detect the issues of crowds and locate places of interest based on the fog nodes and digital street processing. A prototype of the proposed system has been simulated to demonstrate its feasibility and ease of application to determine the benefits and features that it is capable to achieve, if implemented in crowded areas during the course of the Hajj.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128358945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fog Mix-Zone Approach for Preserving Privacy in IoT 物联网中保护隐私的雾混合区方法
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00071
Adnan Ahmed Abi Sen, Ayman J. Alnsour, Sara Abdulaziz Aljwair, Sara Saad Aljwair, Hissah Ibrahim Alnafisah, B. Altamimi
{"title":"Fog Mix-Zone Approach for Preserving Privacy in IoT","authors":"Adnan Ahmed Abi Sen, Ayman J. Alnsour, Sara Abdulaziz Aljwair, Sara Saad Aljwair, Hissah Ibrahim Alnafisah, B. Altamimi","doi":"10.1109/INDIACom51348.2021.00071","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00071","url":null,"abstract":"Protecting privacy has become one of the most important challenges for the future of modern technologies, including the Internet of Things (IoT) and smart city applications. The process of tracking the users' location and analyzing their whereabouts at a certain time can pose a real danger to the users by revealing a lot of their sensitive and private data to the attacker. This research provides a new and improved design of the Mix-zone approach by employing fog nodes for smart management and exchange of pseudonyms between users, and avoiding the automatic generation of them, which can be easily traced and discovered by the service provider. The proposed approach will significantly improve the level of privacy and contribute to misleading malicious parties who always intend to violate the user's privacy. These scrupulous people may even include the service providers. The simulation which we conducted, have demonstrated the ability of the proposed model to protect privacy and its superiority over the traditional approach in terms of the level of privacy and level of performance.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127017593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Technique for Managing Reputation of Peers in the Cooperation Approach for Privacy Protection 隐私保护合作方法中同伴声誉管理的新技术
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00072
A. A. Sen, Shamim Kamal Abdul Nazar, Nazik Ahmed Osman, N. Bahbouh, Hazim Faisal Aloufi, Ibrahim Moeed M. Alawfi
{"title":"A New Technique for Managing Reputation of Peers in the Cooperation Approach for Privacy Protection","authors":"A. A. Sen, Shamim Kamal Abdul Nazar, Nazik Ahmed Osman, N. Bahbouh, Hazim Faisal Aloufi, Ibrahim Moeed M. Alawfi","doi":"10.1109/INDIACom51348.2021.00072","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00072","url":null,"abstract":"Protecting privacy of the user location in Internet of Things (IoT) applications is a complex problem. Peer-to-peer (P2P) approach is one of the most popular techniques used to protect privacy in IoT applications, especially that use the location service. The P2P approach requires trust among peers in addition to serious cooperation. These requirements are still an open problem for this approach and its methods. In this paper, we propose an effective solution to this issue by creating a manager for the peers' reputation called R-TTP. Each peer has a new query. He has to evaluate the cooperated peer. Depending on the received result of that evaluation, the main peer will send multiple copies of the same query to multiple peers and then compare results. Moreover, we proposed another scenario to the manager of reputation by depending on Fog computing to enhance both performance and privacy. Relying on this work, a user can determine the most suitable of many available cooperating peers, while avoiding the problems of putting up with an inappropriate cooperating or uncommitted peer. The proposed method would significantly contribute to developing most of the privacy techniques in the location-based services. We implemented the main functions of the proposed method to confirm its effectiveness, applicability, and ease of application.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116951316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensitivity Analysis of 2D Photonic Crystal based Hexoganal Ring Resonator for Cervical Cancer Detection 二维光子晶体环谐振器检测宫颈癌的灵敏度分析
2021 8th International Conference on Computing for Sustainable Global Development (INDIACom) Pub Date : 2021-03-17 DOI: 10.1109/INDIACom51348.2021.00128
S. Vishalatchi, R. Nagaraj
{"title":"Sensitivity Analysis of 2D Photonic Crystal based Hexoganal Ring Resonator for Cervical Cancer Detection","authors":"S. Vishalatchi, R. Nagaraj","doi":"10.1109/INDIACom51348.2021.00128","DOIUrl":"https://doi.org/10.1109/INDIACom51348.2021.00128","url":null,"abstract":"In this effort, we propose a two dimensional hexagonal ring resonator sensor (2DHRR) for the detection of cervical cancer cell in the women's cervix. Hexagonal ring structure is widely used among research community. This device is based on silicon rods surrounded by air. The detection process is to be done by means of refractive index involved in simulation which creates different position in transmission peaks. It creates a shift which is used to calculate sensitivity. Two sensor design structures are created, analyzed and compared by having analyte in it. The OptiFDTD algorithm plays a role to simulate the transmission of light. The 2DHRR sensor has the sensitivity of 790nm/RIU and the quality factor as 344. The second one which is Inverse 2DHRR sensor has its sensitivity as 570nm/RIU and the quality factor to be 310. The high sensitivity is noticed in 2DHRR sensor. It also retains the high quality factor. The effects of results are promising by means of providing compact size, low power consumption and less weight. Also, this research has got comparatively high sensitivity with which we can even go for with fabrication process.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"53 64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124283356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信