Default Cover Image

2022 IEEE International Symposium on Smart Electronic Systems (iSES)

Dec. 18 2022 to Dec. 22 2022

Warangal, India

ISBN: 979-8-3503-9922-6

Table of Contents

Copyright and Reprint PermissionsFreely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-xxii
Message from the General ChairsFreely available from IEEE.pp. xxii-xxiii
Message from the Technical Program Chairs: iSES 2022Freely available from IEEE.pp. xxiv-xxv
Organizing CommitteeFreely available from IEEE.pp. xxvi-xxviii
Program CommitteeFreely available from IEEE.pp. xxix-xxxii
Steering CommitteeFreely available from IEEE.pp. xxxiv-xxxiv
KeynotesFreely available from IEEE.pp. xxxv-xlv
Invited TalksFreely available from IEEE.pp. xlvi-xlviii
TutorialsFreely available from IEEE.pp. xlix-liii
Industry TalksFreely available from IEEE.pp. liv-lvi
Indian Sign Language TranslatorFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Fault Tolerant Technique for Processor Control Path to Mitigate SEUs in FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 31-35
Hardware-Software Co-Design for Whitening using Zero-Phase Component AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 36-41
Energy Efficient Row Bypassing Scheme for Low Power Binary MultipliersFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
Concurrent Dual Band CMOS LNA with improved IIP3 using Modified DS techniqueFull-text access may be available. Sign in or learn about subscription options.pp. 48-52
A 10-MHz CMOS-based Ring Oscillator with Low Power consumption For On-chip IC ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 53-56
Intelligent Energy-Efficient Power Allocation for Uplink NOMA SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 57-61
Deep-Q Reinforcement Learning based Resource Allocation in Wireless Communication NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 66-72
Power Pattern Synthesis of Time Modulated Circular Array Antenna Employing Optimization AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 78-82
A novel mixed-signal PUF based on Current Mirror InverterFull-text access may be available. Sign in or learn about subscription options.pp. 89-94
Designing Low Cost Secured DSP Core using Steganography and PSO for CE systemsFull-text access may be available. Sign in or learn about subscription options.pp. 95-100
A Lightweight DDoS Detection Mechanism in IoT Networks using Entropy and Expectation of Packet SizeFull-text access may be available. Sign in or learn about subscription options.pp. 101-106
Low Power IoT Soil Moisture Sensor Node for Smart IrrigationFull-text access may be available. Sign in or learn about subscription options.pp. 107-111
An Efficient Configurable Hardware Accelerator Design for CNN on Low Memory 32-Bit Edge DeviceFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
Efficient Multiplication and Accumulation of Signed NumbersFull-text access may be available. Sign in or learn about subscription options.pp. 130-135
Design of CNTFET-based Ternary Logic circuits using Low power EncoderFull-text access may be available. Sign in or learn about subscription options.pp. 142-147
Performance Analysis of Junctionless and Inversion Mode Trigate SOI FinFET at 20nm Gate LengthFull-text access may be available. Sign in or learn about subscription options.pp. 153-157
Improving the Flare Perturbation Response of Gasket Monopole Antenna for Custom Frequency SolutionsFull-text access may be available. Sign in or learn about subscription options.pp. 158-163
Radiation Pattern Comparison of Circular Antenna Arrays Using GA and PSOFull-text access may be available. Sign in or learn about subscription options.pp. 164-168
A Small, Flexible, Circularly Polarized Wearable Antenna for Wireless ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 175-179
A Compact DGS based Ka band Meandered Microstrip Antenna for Fifth Generation IoT ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 180-184
Real Time Vital Sign Monitoring System using AWR1642 Radar Module with Remote AccessFull-text access may be available. Sign in or learn about subscription options.pp. 191-195
FPGA Based Light Weight Encryption of Medical Data for IoMT Devices using ASCON CipherFull-text access may be available. Sign in or learn about subscription options.pp. 196-201
An Efficient Signal Processing Technique for Automated Cardiovascular Disease DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 208-212
Top-down Approach to Solving Speaker Diarization Errors in diaLogic SystemFull-text access may be available. Sign in or learn about subscription options.pp. 213-218
Hybridization of Levy Flight and Chaotic Gravitational Search Algorithm for Image SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 219-224
Isolated Word Recognition based on Convolutional Recurrent Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 225-230
Progressive Multi-scale Deraining NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 231-235
Secure Peer to Peer Learning Using Auto EncodersFull-text access may be available. Sign in or learn about subscription options.pp. 236-241
WiZ-BMS: A Hybrid Wireless Network-on-Chip Design with Fully Adaptive RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 242-247
Efficient successive cancellation decoder architecture for multi-kernel polar codesFull-text access may be available. Sign in or learn about subscription options.pp. 248-250
Epileptic Seizure Inference using Kernalized SVM with integrated training on PYNQ Z2Full-text access may be available. Sign in or learn about subscription options.pp. 251-256
Computational Study of Perovskite/Perovskite Lead-free Tandem Solar Cell DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 257-262
Design of 32-Bit ARM Processor Data Path Units utilizing DVS Current Mode TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 263-266
Security Threat to the Robustness of RRAM-based Neuromorphic Computing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 267-271
Symmetrical Protection of Ownership Right's for IP Buyer and IP Vendor using Facial Biometric PairingFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
Adiabatic Physical Unclonable Function Using Cross-Coupled PairFull-text access may be available. Sign in or learn about subscription options.pp. 278-282
Security Vs Design Cost of Signature Driven Security Methodologies for Reusable Hardware IP CoreFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
Logic Locking Designs at Transistor Level for Full AddersFull-text access may be available. Sign in or learn about subscription options.pp. 289-292
Security and Energy-Aware Resource Allocation in Mobile Edge Computing (MEC)Full-text access may be available. Sign in or learn about subscription options.pp. 293-296
Improving Student Learning in Hardware Security: Project Vision, Overview, and ExperiencesFull-text access may be available. Sign in or learn about subscription options.pp. 297-301
Adaptively Biased Low dropout regulator with High Power Supply Rejection for High speed serial LinksFull-text access may be available. Sign in or learn about subscription options.pp. 312-315
Comparison of GaN and GaAs based Hall Magnetic Sensor for Power ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 316-320
A Compact Highly Isolated UWB-MIMO Diversity Antenna with Quad Band Notch CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 331-336
Blood Pressure Prediction Based on Single PhotoplethysmographyFull-text access may be available. Sign in or learn about subscription options.pp. 337-342
BiLSTM calibrated iGLU with demographic data: Non-invasive Glucose Measurement DeviceFull-text access may be available. Sign in or learn about subscription options.pp. 349-353
Simulation of a Shape Memory Wire based device for Rehabilitation of the Lower limbFull-text access may be available. Sign in or learn about subscription options.pp. 354-357
A 14 nm Single-Ended Schmitt Trigger SRAM Cell for Improved SNM & DelayFull-text access may be available. Sign in or learn about subscription options.pp. 362-365
Accurate Data Acquisition Circuit for MEMS AccelerometerFull-text access may be available. Sign in or learn about subscription options.pp. 366-371
A Novel 2:1 Multiplexer Based Quaternary Full AdderFull-text access may be available. Sign in or learn about subscription options.pp. 372-377
Design of CNTFET based Ternary Subtractor using Unary OperatorsFull-text access may be available. Sign in or learn about subscription options.pp. 378-383
PUF Based Authentication System for IoT Nodes: A Comparative StudyFull-text access may be available. Sign in or learn about subscription options.pp. 390-393
Age Estimation based on MFCC Speech Features and Machine Learning AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 398-401
Review of the State-of-the-Art of Data GlovesFull-text access may be available. Sign in or learn about subscription options.pp. 402-405
Design and FPGA Implementation of the LUT based Sigmoid Function for DNN ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 410-413
YouHome System and Dataset: Making Your Home Know You BetterFull-text access may be available. Sign in or learn about subscription options.pp. 414-420
Range Based Hardware Optimization of Multilayer Perceptrons with RELUsFull-text access may be available. Sign in or learn about subscription options.pp. 421-426
PUF-based Authentication Scheme for Edge Data Centers in Collaborative Edge ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 433-438
TP-NET: Training Privacy-Preserving Deep Neural Networks under Side-Channel Power AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 439-444
Analysis of the Satisfiability Attack Against Logic Encryption Using Synthetic BenchmarksFull-text access may be available. Sign in or learn about subscription options.pp. 445-450
On-board Battery Health Prediction in Sensor Node for Sustainable IoTFull-text access may be available. Sign in or learn about subscription options.pp. 453-454
Lightweight Security Architecture for IoT Edge DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 455-458
Showing 100 out of 158