2019 Third International Conference on Inventive Systems and Control (ICISC)最新文献

筛选
英文 中文
Implementation of Low Voltage Floating Gate MOSFET based Current Mirror Circuits using 180nm technology 基于180nm技术的低压浮栅MOSFET电流镜像电路的实现
2019 Third International Conference on Inventive Systems and Control (ICISC) Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036355
Ansuman Mishra, M. Bhat, Prasad Krishna Pai, D. Kamath
{"title":"Implementation of Low Voltage Floating Gate MOSFET based Current Mirror Circuits using 180nm technology","authors":"Ansuman Mishra, M. Bhat, Prasad Krishna Pai, D. Kamath","doi":"10.1109/ICISC44355.2019.9036355","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036355","url":null,"abstract":"The paper discusses implementation of low voltage (LV) basic current mirror (CM) and cascode current mirror (CCM) circuits using Floating Gate MOSFET (FGMOS) devices. The performance parameters such as output resistance, minimum output voltage requirement and power dissipation are compared for basic CM and double CCM circuits. The current mirror circuits are implemented with 180 nm technology using Cadence Virtuoso and simulated with Spectre RF. The simulation results are in good agreement with theory. The FGMOS based basic CM and double CCM circuits exhibited 52.4% and 40% power reduction as compared to gate driven current mirror circuits.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124472615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Novel Multi-Source Inverter Based Hybridization Scheme for Electrical Energy Storage System Using Renewable Source 基于多源逆变器的新型可再生能源储能系统混合方案
2019 Third International Conference on Inventive Systems and Control (ICISC) Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036411
Y. Mahadik, Vinayak Ansurkar, A. Kadam
{"title":"Novel Multi-Source Inverter Based Hybridization Scheme for Electrical Energy Storage System Using Renewable Source","authors":"Y. Mahadik, Vinayak Ansurkar, A. Kadam","doi":"10.1109/ICISC44355.2019.9036411","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036411","url":null,"abstract":"In this paper, a new battery/solar Novel Energy Management System topology is proposed to meet efficacy and make the system cost effective. The battery/solar HESS uses a multi-source inverter to connect the battery and solar energy three phase load. A small DC/DC converter is used for boosting the voltage coming from solar source. The durability of the battery is a major concern in any electric vehicle hence this circumscription is overcome by connecting solar source along with the battery. This topology is advantageous in the sense that it makes the system more compact, improves the durability and also the overall cost of the battery reduces significantly. The regenerative braking does not directly affect the battery and thereby consequently enhancing the life, endurance, efficiency, and reliability of the battery.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"42 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121013312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tetrahedral 3D Mesh Generation for Medical Images 医学图像的四面体三维网格生成
2019 Third International Conference on Inventive Systems and Control (ICISC) Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036329
S. G, Tripty Singh
{"title":"Tetrahedral 3D Mesh Generation for Medical Images","authors":"S. G, Tripty Singh","doi":"10.1109/ICISC44355.2019.9036329","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036329","url":null,"abstract":"In this paper, the tetrahedral 3D mesh using MRI/CT images i.e., Medical Images is generated. The 3D mesh is generated for segmented medical images. Tetrahedral component is a necessary part for mesh generation with the parameters of boundary points and sampling points for the anatomic model. It will also extract the internal and external surface of that structure for tetrahedral homogenously. It can also be used for multi-modal complex structure. Thus, classify and label the particular type of tissue for which the mesh is to be generated.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132977248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of Genes Responsible for the Development of Cancer using Machine Learning 利用机器学习分析导致癌症发展的基因
2019 Third International Conference on Inventive Systems and Control (ICISC) Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036398
Geetika Aggarwal, Sarika Jain
{"title":"Analysis of Genes Responsible for the Development of Cancer using Machine Learning","authors":"Geetika Aggarwal, Sarika Jain","doi":"10.1109/ICISC44355.2019.9036398","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036398","url":null,"abstract":"The average adult human's body is made up of approximately 37 trillion cells. Healthy cells in our bodies divide and replace themselves in a controlled fashion throughout our lives. But when healthy cells divide uncontrollably, they form new, abnormal cells, thus making a lesion in an affected body part. This lesion can be cancerous or non-cancerous. At what stage one got to know about the cancerous tumour is crucial as that would decide the basis of treatment. In this paper, we mentioned the basics of cancer and used different algorithms of data mining to detect breast cancer. In our proposed research work, WEKA software is applied with ten cross validation to calculate and accumulate result.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125172991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and SAR Analysis of a body wearable Textile patch Antenna 一种人体可穿戴纺织品贴片天线的设计与SAR分析
2019 Third International Conference on Inventive Systems and Control (ICISC) Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036379
J. Singh, B. S. Sohi
{"title":"Design and SAR Analysis of a body wearable Textile patch Antenna","authors":"J. Singh, B. S. Sohi","doi":"10.1109/ICISC44355.2019.9036379","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036379","url":null,"abstract":"In this paper a body wearable textile patch antenna operated at 2.4 GHz is presented. The designed antenna is analyzed under bend and flat conditions. For design of this antenna, 3 mm thick wash cotton with dielectric constant of 1.51 is used as a substrate and 0.04 mm thick copper is used as conductive part of antenna. An electromagnetic band gap (EBG) is employed as a ground plane to reduce the SAR (specific absorption rate) when the same antenna is simulated on a three layered body phantom model (containing muscles, skin and fat). Using the EBG, SAR value of antenna has been reduced by 97.96% as compared to conventional antenna. Due to good return loss, high bandwidth and gain designed antenna is suitable for wearable applications.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Medical Imaging - Boundary Solutions 医学成像。边界解决方案
2019 Third International Conference on Inventive Systems and Control (ICISC) Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036469
M. Viswanath, R. Seetharaman, D. Nedumaran
{"title":"Medical Imaging - Boundary Solutions","authors":"M. Viswanath, R. Seetharaman, D. Nedumaran","doi":"10.1109/ICISC44355.2019.9036469","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036469","url":null,"abstract":"Boundary detection to a narrow scale or for a Region of Interest are required for studying the affected area in an human organ depending on the nature of the disease and the damage it caused to the specific organ. The problem is narrowed down to edge detection and the associated complexities. Precisely, it concentrates over a small region of interest confined to a specific area lying anywhere on the shape of study under consideration. Even though there are many imaging methods which help to overcome these kinds of situation, there are limitations. This paper addresses these issues with the help of Contourlet Transformation. Further, Gradient and Laplacian operators help in tuning the edge detection. Comparatively, the proposed methods perform better than the traditional methods. But, still the direction specific issues and extension issues made these techniques difficult to achieve the expected accuracy. Moreover, the Contourlet transform addresses the edge detection problem very well in digital domain. Finally, the Contourlet Transformation helped to overcome all of these issues by capturing the required data that involved the features in an image which ultimately focused on bringing the discreteness of the nature of the problem.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121131527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Simulation Study of Mutual Coupling of MIMO System for Millimeter Wave Communications 毫米波通信中MIMO系统互耦合的仿真研究
2019 Third International Conference on Inventive Systems and Control (ICISC) Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036456
Yusra Banday, G. M. Rather, G. R. Begh
{"title":"A Simulation Study of Mutual Coupling of MIMO System for Millimeter Wave Communications","authors":"Yusra Banday, G. M. Rather, G. R. Begh","doi":"10.1109/ICISC44355.2019.9036456","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036456","url":null,"abstract":"Mutual coupling affects the characteristics of an antenna element in an array and causes the spectral re-growth. With the result the performance of the multiple-input multiple-output (MIMO) system degrades. This affects the Signal-to-Noise Ratio (SNR) of a MIMO system and hence its BER performance. This paper presents the effect of antenna mutual coupling on BER of a MIMO channel under different coupling and correlation scenarios, using orthogonal space-time block code (OSTBC) transmission. Under High coupling environment with High correlation BER shows improvements whereas degradation in BER performance is observed when correlation is low.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126749697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Front-End IoT Application for the Bitcoin based on Proof of Elapsed Time (PoET) 基于运行时间证明(PoET)的比特币前端物联网应用
2019 Third International Conference on Inventive Systems and Control (ICISC) Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036391
M. A. Kumar, V. Radhesyam, B. Srinivasarao
{"title":"Front-End IoT Application for the Bitcoin based on Proof of Elapsed Time (PoET)","authors":"M. A. Kumar, V. Radhesyam, B. Srinivasarao","doi":"10.1109/ICISC44355.2019.9036391","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036391","url":null,"abstract":"There are some registry agreements that may be appropriate for the Internet of Things (IoT), including Bitcoin, Hyperledger Fabric and IOTA. This article presents quickly and examines them in terms of the progress of Internet applications. Block-dependent IoT applications can consolidate the chain's rationale (smart contracts) and front-end, portable or front-end web applications. We present three possible designs for BC IoT front-end applications. They vary depending on the Bitcoin block chain customer (neighborhood gadget, remote server) and the key location needed to manage active exchanges. The vital requirements of these projects, which use Bitcoin to organize constructive exchanges, are the volumes of information, the area and time of the complete block and block block, and the entry of the Bitcoin store. The implications of these surveys show that it is unlikely that a full Bitcoin distributor will continue to operate reliably with a mandatory IoT gadget. Then, designing with remote Bitcoin customers is, in all respects, a suitable methodology in which there are two minor alternatives and vary in key storage / management. Similarly, we recommend using the design with a unique match between the IoT gadget and the remote blockchain client to reduce system activity and improve security. We hope you also have the ability to operate with versatile verses with low control and low productivity. Our review eliminates the contradictions between synthesis methodologies, but the final choice for a particular registration agreement and the original technique completely depends on the proposed use case.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Prevention of Drive by Download Attack (URL Malware Detector) 防止下载驱动攻击(URL恶意软件检测器)
2019 Third International Conference on Inventive Systems and Control (ICISC) Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036341
A. Tyagi, Laxmi Ahuja, S. Khatri, S. Som
{"title":"Prevention of Drive by Download Attack (URL Malware Detector)","authors":"A. Tyagi, Laxmi Ahuja, S. Khatri, S. Som","doi":"10.1109/ICISC44355.2019.9036341","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036341","url":null,"abstract":"This paper is intended to inform the user about a software tool called ‘url malware detector’. This software will help the user avoid falling prey for drive by download attacks. This tool accepts the url as the input text in a. txt file extension. It lists the files that are downloaded in backend during the process of urlvisitization and scans them on an online malware detection tool and yield the results in a SQLite database and visualizations. The details of the malware present in those files are represented in a graphical format. It uses MD5 hash technique. The paper consists of the detailed analysis of the tool in 5 modules for more comprehensibility. This paper will be helpful for the Inquisitors who wish to learn about prevention of drive by download attacks. This will also prove to be of great importance to people who want to be equipped with the updating of latest security threats while surfing World Wide Web.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127553663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reduction of Noises From Degraded Document Images Using Image Enhancement Techniques 利用图像增强技术减少退化文档图像中的噪声
2019 Third International Conference on Inventive Systems and Control (ICISC) Pub Date : 2019-01-01 DOI: 10.1109/ICISC44355.2019.9036418
N. Habibunnisha, K. Sivamani, R. Seetharaman, D. Nedumaran
{"title":"Reduction of Noises From Degraded Document Images Using Image Enhancement Techniques","authors":"N. Habibunnisha, K. Sivamani, R. Seetharaman, D. Nedumaran","doi":"10.1109/ICISC44355.2019.9036418","DOIUrl":"https://doi.org/10.1109/ICISC44355.2019.9036418","url":null,"abstract":"Evolution of digital devices and computers makes an increasing attraction in document image analysis. Many of the paper documents have been transferred and stored using digital devices in large manner. In this work, we have done image enhancement techniques to reduce the noises from degraded document images. Here, we have taken sample images from Document Image Binarization Contest (DIBCO) dataset images. We have done contrast stretching, histogram equalization, noise filtering, Laplacian transformation, global and local thresholding methods to remove show-through noise, uneven illumination noise and shot noise from degraded document images using OpenCV open source software. Further, performance metrics were estimated to understand the efficiency of the above methods in removing the aforementioned noises.","PeriodicalId":419157,"journal":{"name":"2019 Third International Conference on Inventive Systems and Control (ICISC)","volume":" 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113949680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信