ICMACC-22: INTERNATIONAL CONFERENCE ON RECENT TRENDS IN MICROELECTRONICS, AUTOMATION, COMPUTING AND COMMUNICATIONS SYSTEMS (ICMACC-22))
TALK KEYWORD INDEX

This page contains an index consisting of author-provided keywords.

1
1 Internet of Things
1)Artificial Intelligence
1. Automatic Voice command drug dispenser
2
2 Analog to Digital Converter
2)Protection relays
2. Arduino
3
3 Digital to Analog Converter
3)Distribution Generation
3. IoT
32-bit
3D printing
4
4 light weight Deflectometer
4)Radial basis network
45nm Technology
5
5 Benkelman Beam Deflection
5)Confusion Matrix
5G
5G Wireless Networks
6
6G
6G network
A
AA6351-T6
AC Cycle
Accelerator
Activation function
Ada boost
ADC
adder
Adder Enhancement
Ads
aes
AES encryption in payment
Affective
Alcohol level
AlGaN/GaN
Allergen Free Food
ambiguity function
Analog Neural Networks
anomalous behavior
AntennaRange
anti-theft
Approximate matrix inversion
Arduino
Arduino Mega
Arithmetic Logic Unit
Arm
Arrhythmia
Artificial neural network
ARTIX FPGA
aspect angle
Assessment Methods
ATK-SE
author
Autoencoders
automated proctoring
Automation
B
bandwidth
BaseTransreceiverStation
Big Data
BiLSTM
Bio Signals
BIST - Built-In Self Test
Bistable Approximation simulation engine
Blockchain
Boost Converter
Boron doped NCD
Bottom-up approach
Brain Imaging
brain tumor detection
BRAM - Block RAM
Bridge the gap
C
C-arm
Cable fault monitoring
CAN
CANoe
capacitive accelerometer
Cardiac Disorders
Cardiotocograph (CTG)
Career
Carry Skip Adder (CSA)
Cascade H-Bridge Multilevel Inverter
CCU Panel
CDR
Centrifugal casting
Channel modelling
Cipher Text
Class topper optimization (CTO)
Class topper optimization algorithm
classification
Classifier
CLB's - Configuration Logic Block
Cloud Computing
Cloud Security
CMOS
CMOS logic
CMOS Technology
CNN
Cognitive Radio
Coherence vector energy simulation engine
Combined economic and emission dispatch problem
Combined Emission Economic Dispatch (CEED)
Communication Access Programming Language
Communication trust
Comparator
Competency
Component Testing
Computer-Aided Diagnosis (CAD) system
Computing
Confidentiality
Consumer behavior
Continuance
Convolution
Convolution engine
Convolutional Layers
Convolutional neural network
Convolutional Neural Networks (CNN)
Cooperative Spectrum Sensing
Copper powder
Copula
Correct detection ratio
Correlation Power Analysis
Coupled Inductor(CI)
Course Outcomes
COVID-19
CRC
Crisis
Cross-correlation coefficient (CC)
Cryptocurrency
Cryptographic encryption
CVN
Cyber Secuirty
Cybercrime
D
DAC
Dark channel prior algorithm
Data Sharing
Database Management
DBR (Diode Bridge Rectifier)
DC-DC Converter
Decision Tree model
Deep Learning
Deep neural network
Defacement
des
Design Verification
Device under Test (DUT)
Devops
Diamond substrate
Differential Power Analysis
Digital Multiplier
Digitalization
DNN
DNN Similarities
Domino Keeper Logic
Double sandwich composite
DSP - Digital Signal Processor
dynamic QR Code
E
e-commerce
e-transaction
eat Transfer
ECC
ECG
Economic Dispatch Problem (ELD)
ECU
edge
Edge devices
Education
Elastomer foam
ELD
Electric Vehicles (EVs)
Electricity
Electronic Control Unit (ECU)
Energy efficiency
Energy Meter - is the meter which tells the reading of consumption of electricity
Energy Storage System (ESS)
Entropy parameters
Error Detection and Correction
ESP32
Ethical implications
examinee recognition
examinee spoofing
eye-gaze estimation
F
Fabrication
Face recognition classification
fading
feature extraction
Feature face
Feature Fusion
Federated Learning
Femto Cell
FERD
Fetal expression
Fetal Heart Rate (FHR)
FFT
FHR Variability
Finite Element Analysis
FIR
Five level
Flexural strength
Floating-point
Footstep
FPGA
Fractional Hilbert transform
Frank Copula
Frequency response masking(FRM)
Frequency transformation(FT)
Friction Stir Welding
Full Adder
Fuzzy-PI controller
G
Gabor feature extraction
gadget detection
gas sensing
Gaussian noise
GDI
GLAD
Glaucoma
GNR FET
GPS and GSM
Graph based low pass filter
Graph with Fast Localization spectral filters
GS-GNR FET
GSM
GSM - to transmit msg
H
Harris corner points
Harris Hawk Optimization
Harvesting
head pose estimation
Health Monitoring
Heart Disease
Hermitian Multi-wavelet transform
Heterogeneous images
Heterogeneous Networks
heterostructure
Higher education
Higher Educational Institutes
Hilbert transform
Hiring
home automation
Hospitality sector
Hotels
HUB
HVAC
Hybrid Adaptive Rood Pattern
hysteresis current control
I
IFFT
Image Denoising
Image processing
incubator
Industrial Automation
Instrumentation
Integrated Circuit
integrated side lobe ratio
interactive
Internet of Things
Internet of Things(IoT)
IoT
IOT Technology
IR sensor
iterative algorithm
Iterative Methods
ITS
J
JavaScript
K
K-mean clustering
K-Means Clustering
Kho-Kho Optimization (KKO) technique
Kriging Regression
L
LabVIEW
LabView@2015
Landslide Conditioning Factor (LCF)
Landslide Inventory Mapping (LIM)
Landslide Susceptibility Mapping (LSM)
Layerpipe
Leakage Current
lightGBM
LIN
linear frequency modulation
Link Change Rate
Logistic regression
Logistic regression model
logistics
Long short-term memory Neural Network
Low frequency oscillation (LFO)
Low probability of intercept
LR
LSTM
LTE
Lung segmentation
M
MAC unit
Machine Learing
Machine Learning
Machine Learning lifecycle
Malware
Mass-Marketing Fraud
Massive MIMO
MDCP
Median Filter
Memristor
MEMS
Mental illness
Metaverse
Methodology and SAKURA G
Micro generators
Microcontrollers
MIMO
MIP
ML
ML Ops
MLFlow
MLOps
Mobile Ad Hoc Networks Routing
Mobile application
Mobile devices\
Mobile Trust Factor
Modbus Master
Modbus RTU
Modbus Slave
Modified Booth’s multiplier
Modified Data Cipher Policies
modulation
MongoDB
motion estimation
Moving robot
MRI image
Multi-Objective Optimization
Multiplier
N
Nano-crystalline Diamond
Nanowires
Natural Language Processing
Navigation
Naïve Bayes
NB Classifier
neonatal
Neural Networks
Night vision camera
NLC
NLP
Node MCU
Node.js
NodeMcu
Normative
NP Domino logic
Numerical computation
NVC
O
obstacle detection
Online Dating Fraud
Online proctoring
Online Social Media
Online Social Network
op-amp
Open CV
open weather MAP API
Optimization based algorithm
Optistruct software
order information
Organizational Commitment
Otsu Thresholding
overhang constraint
OWASP
P
P10 LED board
Parallel -beam suspension
Parallel self trained timed adder
payment
payment QR Code
payment transaction
PDP
peak side lobe ratio
Performance Indicators
petabyte
Phase change
Phishing
PhobiCure
Plate-fin heat exchanger
PLC
Polyethylene foam
polyphase codes
polytime
power allocation
Power Exponential type 2
Power generation
Power line communication
Power operated Tailgate (POT)
Power system stabilizer (PSS)
pre-processing
Precipitation
Precision
Prepaid - before hand
preterm baby
Privacy of metaverse
profiling
Program outcomes
propagation scenario
PSNR
pulse compression
PZT
Q
QR Code
Quantum-dot Cellular Automata (QCA)
R
radar cross section
radio channel
random forest
Random Forest model
randshift
Raspberry pi
Raspberry pi v3 Model B plus
Re-configurable hardware
readers
Recommendation Systems
Regression
Remote Desktop Access
Reordered Normal Basis
Resource aware D2D communication
Reverse Gumbel
RFA
RFID
Rice leaf disease
Ripple Carry Adder (RCA)
RNN
Robot
rounding
ROV
RS 422 protocol
Rumours
S
safety
Salt & pepper noise
SAR
SCA Hardware Security
SCADA
scale data
Scanning Electron Microscopy
SCL
secure electronic transaction
secure payment
security
security in e-commerce
security measures
Security of metaverse
segmentation
Semantic Segmentation
Sensor Coverage
Sensors
Sensors and Actuators
Sentiment analysis
SET
SiC substrate
Single Error Correction
Smart Cities
Smart Grid
smart helmet
Smart Parking
Social Media
Social Network frauds
SoCs
Softmax activation function
Software Development lifecycle
sound sensor
Spectral analysis
Spectrum Sensing
Speed Up Robust Features (SURF)
Spring constant
Sputtering
SRAM
SSIM
Stack Filter
steganography
sub-surface weld defects
supply-chain
Support Vector Machines
SVM
Swarm Intelligence
SWCNT
swerling models
Systolic AI
Systolic arrays
T
TCAM
technology
telehealth care
Temperature
Tensile Strength
TestStand
Text blob
THD
Thepade SBTC
Thermal design
Top-down approach
Topology Optimization
Total annual cost reduction
Transcoders
Transfer Learning
Trust
trusted ecosystem
U
U-NET
UGB
unbiasing
Underwater
URL
user’s behaviour
V
Vader
Validation
VANET
Vedic multiplier
Vehicular Ad-hoc Network
Very Large Scale Integration Design
Vickers Hardness
Virtual Reality Exposure Therapy
vocal snippet
Volterra Filter
VT system
vulnerabilities
W
warehouse
Water Absorption
WAVECT Controller
web application attacks
Weight of Evidence (WoE)
Wi-Fi
X
X-ray
X-ray generator
X310 USRP SDR
XGBosst Classifier model
Xilinx
Xilinx ISE 14.7
Y
Yahoo Finance
Z
ZnO
ZYNQ framework