The proceedings contain 283 papers. The topics discussed include: harmonic elimination in cascade multilevel inverters using firefly algorithm;investigations on vehicle rollover prevention using open loop steer-by-wir...
ISBN:
(纸本)9781479923977
The proceedings contain 283 papers. The topics discussed include: harmonic elimination in cascade multilevel inverters using firefly algorithm;investigations on vehicle rollover prevention using open loop steer-by-wire system;investigation of critical parameters of mixed insulating fluids;content based filtering in online social network using inference algorithm;implementation of shunt active power filter using sliding mode controller;comparison of reference current generation for shunt active power filter using Goertzel algorithm and enhanced PLL;biometrics to control ATM scams: a study;self-adaptive firefly algorithm based transmission loss minimization using multi type FACTS devices;electric field distribution analysis of 110 kV composite insulator using finite element modeling;investigation of three phase squirrel cage induction motor coated with ZrO2 nano composite;and reduction of harmonics in 3-phase, 3-wire system by the use of shunt active filter.
The increasing demand for energy-efficient digital circuits in resource-constrained environments like mobile devices has driven the need for optimized low-power designs. This research focuses on the design of a 4-bit ...
详细信息
Approximate computing is a promising paradigm for improving the performance parameters of electronic systems at the expense of accuracy in error-resilient tasks such as multimedia processing, image multiplication, and...
详细信息
This paper presents a comparative analysis of CMOS CS Amplifiers with varying channel lengths of 45nm and 90nm, as well as a Two-Stage CMOS CS Amplifier using 45nm technology. The performance parameters such as gain, ...
详细信息
In recent decades, technological progress has extended across various areas, including integrated circuits in processors, networking, wireless devices, storage technologies, and software. These advancements have enabl...
详细信息
The energy flow between the electrodes in arc welding procedures must be precisely and effectively dynamically controlled to achieve superior weld strength and quality, increased productivity, and reduced fume formati...
详细信息
The integration of solar energy harvesting systems into wearable devices presents a promising avenue for extending their operational lifespan and reducing dependency on traditional power sources. However, the intermit...
详细信息
Skin is the interface between our body and the environment. Its unique properties and sensing capabilities allow us to perceive the world around us. Information about shape, texture, stiffness, temperature, and pain c...
详细信息
作者:
Joy, AncyDamodaran, AnjuKuruvilla, Jinsa
Muthoot Institute of Technology and Science Dept. of Electronics and Communication Cochin India
Dept. of Electronics and Communication Cochin India
Memory optimization plays an important role in electronic devices. With low latency and high-speed data access capabilities, SRAM gains prominence. Crucial for high-speed caches, AI and other networking applications t...
详细信息
In IoT scenarios, data needs to be collected from various sites and securely transferred. A signcryption scheme can ensure both data confidentiality and authentication. Given the limited computingpower and storage ca...
详细信息
In IoT scenarios, data needs to be collected from various sites and securely transferred. A signcryption scheme can ensure both data confidentiality and authentication. Given the limited computingpower and storage capacity of IoT devices, the signcryption scheme must prioritize higher execution efficiency and shorter cipher-text length. Accordingly, a new signcryption scheme has been proposed to meet these requirements. The confidentiality and unforgeability of the new scheme have been analyzed based on the discrete logarithm problem and the computational Diffie-Hellman problem in the random oracle model. Additionally, the proposed method also demonstrates three other security attributes: public verifiability, key escrow security, and nonrepudiation. Performance analysis indicates that the new scheme requires less storage space and possesses lower computational complexity. Simulation results further confirm that the new method achieves higher efficiency, making it suitable for IoT scenarios.
暂无评论