{"title":"90nm CMOS Low Power Multimodulus 32/33/39/40/47/48 Prescaler with METSPC Based Logic","authors":"V. M. Zackriya, H. Kittur","doi":"10.1109/ICACC.2013.102","DOIUrl":"https://doi.org/10.1109/ICACC.2013.102","url":null,"abstract":"The prescaler is primarily used in phased locked loop (PLL) to generate higher reference frequency for the loop, which supplies more samples per unit time to the phase detector to attain better frequency stability. This paper is first to present a Modified Extended True Single Phase Clock (METSPC) based 2/3 prescaler design. The METSPC-FF is fully investigated across all the process corners for power consumption and delay along with its functionality for GHz operations. Both ETSPC and METSPC are compared to find that the PDP of METSPC is 64.96% better than ETSPC. Thus using METSPC enhances the operating performance of the prescaler. A multimodulus 32/33/39/40/47/48 prescaler is proposed and its operation is verified over all PVT variations with a max. frequency of 6GHz. Simulation is performed in TSMC 90 nm technology using CADENCE SPECTRE simulator at supply voltage of 1.1V.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114648051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation on Multi Focus Images Using Block Based Feature Level Method","authors":"S. Praveena, I. Vennila, A. Kavitha","doi":"10.1109/ICACC.2013.46","DOIUrl":"https://doi.org/10.1109/ICACC.2013.46","url":null,"abstract":"Image fusion is a sub-field of image processing in which more than one images are fused to create an image where all the objects are in focus. The process of image fusion is performed for multi-sensor and multi-focus images of the same scene. Multi-sensor images of the same scene are captured by different sensors whereas multi-focus images are captured by the same sensor. In multi-focus images, the objects in the scene which are closer to the camera are in focus and the farther objects get blurred. Contrary to it, when the farther objects are focused then closer objects get blurred in the image. To achieve an image where all the objects are in focus, the process of images fusion is performed either in spatial domain or in transformed domain. In recent times, the applications of image processing have grown immensely. Usually due to limited depth of field of optical lenses especially with greater focal length, it becomes impossible to obtain an image where all the objects are in focus. Thus it plays an important role to perform other tasks of image processing such as image segmentation, edge detection, stereo matching and image enhancement. Hence, a novel feature-level multi-focus image fusion technique has been proposed.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114468978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Deshmukh, T. Tirodkar, Ankita R. Jain, A. Joshi, K. P. Ray
{"title":"Formulation of Resonant Length for Triple Band Rectangular Microstrip Antennas","authors":"A. Deshmukh, T. Tirodkar, Ankita R. Jain, A. Joshi, K. P. Ray","doi":"10.1109/ICACC.2013.27","DOIUrl":"https://doi.org/10.1109/ICACC.2013.27","url":null,"abstract":"The triple band stub loaded U-slot or rectangular slot cut RMSAs are discussed. The stub reduces the resonance frequency of TM02 mode of the patch and along with TM10 mode yields dual band response. Further, an analysis to study the effect of slot on the triple band response in stub loaded rectangular micro strip antenna is presented. The surface current distributions and radiation pattern plots were studied. The U-slot or rectangular slot reduces the resonance frequency of next higher order TM12 mode of the patch and along with the modified TM10 and TM02 modes yields triple band response. By studying the surface current distributions, a formulation in resonant length at modified TM10, TM02 and TM12 modes is proposed. The frequencies calculated using the proposed formulations agrees closely with simulated results with % error less than 5% over the complete slot length range.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114477001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. N. Ravichandran, Satish Sharma, K. Raghunandana, Sunil, H. S. Vasudevamurthy, N. Valarmathi
{"title":"Design and Implementation of Baseband Digital Modulator for CDMA Communication System","authors":"P. N. Ravichandran, Satish Sharma, K. Raghunandana, Sunil, H. S. Vasudevamurthy, N. Valarmathi","doi":"10.1109/ICACC.2013.111","DOIUrl":"https://doi.org/10.1109/ICACC.2013.111","url":null,"abstract":"Code Division Multiple Access (CDMA) technique provides anti jamming capability, carrier frequency reuse and most importantly, avoids unauthorized access to the systems. aft. The paper presents the design and implementation of base band digital modulator for a CDMA communication system. It describes the selection criteria for spreading code along with their implementation. To achieve more hardware efficiency and good phase resolution, Coordinate Rotation Digital Computer (CORDIC) is used in realizing the base band BPSK modulator. The paper also presents the comparison of CORDIC based and look up table based modulator. The application of developed system in satellite communication is explored. The system is implemented on XILINX FPGA platform and tested in real time for its performance.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123099441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of Data Embedding Technique Using Adaptive Pixel Pair Matching for Security","authors":"C. A. Nafsiya, V. Hari, A. Neela Madheswari","doi":"10.1109/ICACC.2013.41","DOIUrl":"https://doi.org/10.1109/ICACC.2013.41","url":null,"abstract":"This paper proposes a secure data hiding method. The main technique behind the pixel pair matching is that, more than one pixel is used or consoled for embedding a data at a time. In adaptive pixel pair matching, it will select two pixel values, and a neighbourhood set is identified. A pixel pairs from the neighbourhood is selected to replace base on the current message digit to embed. There are two data hiding methods proposed based on pixel pair matching before, they are diamond encoding and Exploiting modification direction. The maximum capacity of the is limited to the first by 1.161 p. The proposed system would offer better security than normal adaptive pixel pair matching. The encryption algorithm used to enhance security is vigenere cipher of all ASCII characters.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124910160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature Based Image Manipulation","authors":"S. Gopika, P. Mintu","doi":"10.1109/ICACC.2013.51","DOIUrl":"https://doi.org/10.1109/ICACC.2013.51","url":null,"abstract":"This paper presents a method for feature-based image representation. In the proposed method, an image is decomposed into a skeleton component and a residual component. The skeleton component is obtained by performing iterative linear interpolation based on high-curvature points, which are extracted from the image surface. These points help in representing the image through a compact and reversible way. The residual component shows the difference between reconstructed component and the original image. The compact representation offers an encrypted and compressed form which can be transmitted over blue-tooth to other devices. Proper authentication offers one more level of security. By efficient manipulation, several applications, such as adaptive contrast enhancement, achromatic information modification and shape editing can be achieved.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122543841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a Mesfet based Low Noise Amplifier with Improved Noise Figure for Low Power Wireless Applications in 2-3 GHz","authors":"P. B, J. P","doi":"10.1109/ICACC.2013.112","DOIUrl":"https://doi.org/10.1109/ICACC.2013.112","url":null,"abstract":"A Low Noise Amplifier (LNA) based on NEC 0.3μm GaAs MESFET technology has been designed with a modified cascode configuration which makes use of two common source transistors. In the 2-3GHz range, the designed LNA has a noise figure less than 0.65dB, maximum intrinsic gain of 18.4dB, P1dB of 2dBm, IIP3 of -1.6dBm and 20mW power consumption at a supply voltage of 3V. The dynamic range of the designed LNA is 60.6dB. The characteristic impedance is chosen as 50O. The custom layout of the proposed LNA has been designed.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122925250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Adaptive Filter Using Adaptive Line Enhancer Techniques","authors":"R. Soumya, N. Naveen, M. Lal","doi":"10.1109/ICACC.2013.39","DOIUrl":"https://doi.org/10.1109/ICACC.2013.39","url":null,"abstract":"The paper discusses a method for detection of weak signal having low signal to noise ratio (SNR). SNR can be improved using fixed filters or using a suitable adaptive filter. In practical application, the statistical characteristics of signal and noise are usually unknown. The design of fixed filter is based on priori knowledge of both the signal and noise. Adaptive filters, on the other hand, have the ability to adjust their own parameters automatically and their design requires no priori knowledge of signal or noise characteristics. The adaptive line enhancer is applied before the FFT analysis to improve the detection performance. Performance of ALE using LMS and the RLS algorithms and a set of block processing algorithms BLMS, BAP are also compared. We simulated the adaptive filter with MATLAB, and the results prove its performance is better than the use of a conventional digital filter.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124111092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application: DDoS Attacks Resistance Scheme Using Polynomial Distribution Model","authors":"Vince Paul, K. Prasadh, Sankaranarayanan","doi":"10.1109/ICACC.2013.64","DOIUrl":"https://doi.org/10.1109/ICACC.2013.64","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks pose an increasingly grave threat to the Internet, as evidenced by recent DDoS attacks mounted on both popular Internet sites and the Internet infrastructure. Alarmingly, DDoS attacks are observed on a daily basis on most of the large backbone networks. The previous work presented Gaussian distribution factor to enhance the attack resistance scheme for having better detection rate even for stationary object in the application DDoS attacks. The attack detection is identified with the Gaussian distribution of the traffic data of flash crowds surrounding the respective web sites with Bayes optimal filter strategy. But it consumes more time to distribute the Gaussian factor across the Applications used in the network and the security of services in applications also being less. To improve the security and service factor of the network, in this work, we are going to present a polynomial distribution model for attack resistance scheme by distributing the application services prior to sending the packet data streams. The distribution is done at first, so, the service abnormality is identified efficiently. The polynomial distribution is done for organizing the packet data which is to be sent with application services. The simulation using Network Simulator results proves that the attack resistance using polynomial distribution model minimizes execution time, distribution and load overhead and improves the security of the services present in the application contrast to an existing enhanced attack resistance scheme for app-DDoS attacks using Bayes optimal filter strategy.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129804238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memory Efficient, High Speed Implementation of MAX LOG MAP Decoder for CCSDS Turbo codes","authors":"Bibin Varghese, V. K. Ansha, S. Sreelal, N. Shanu","doi":"10.1109/ICACC.2013.89","DOIUrl":"https://doi.org/10.1109/ICACC.2013.89","url":null,"abstract":"This paper presents an efficient and reduced memory design and FPGA implementation of Max-Log-maximum a posteriori (MAP) turbo decoder for CCSDS telemetry channel coding standard. Efficient implementation comes from using integer arithmetic, sliding window(SW) technique and compact hardware and memory management. The memory requirements are systematically investigated and optimized for the soft inputs and metrics used. A shift register based sliding window technique along with a single cycle interleaver address generator made it possible to process a trellis stage per clock cycle. Simulations are done in MATLAB to assess the BER performance of the design in an AWGN channel. This paper tells that, about 81% of memory reduction has been achieved using proposed sliding window technique with 1.03cycles/stage decoding speed. By introducing a combinational logic for interleaver address generation, 99% of memory has been reduced for that purpose. Using 4 bit soft inputs and by weighing the apriori values shows only a 0.6dB degradation in the BER performance from log map floating point implementation. By careful manipulation of the hardware, we implement the whole turbo decoder with a single decoder structure which has a core usage of 76% and, SRAM utilization of 22% of the selected FPGA to achieve a throughput of more than 31 MBps per full iteration at an operating frequency of 64 MHz.","PeriodicalId":109537,"journal":{"name":"2013 Third International Conference on Advances in Computing and Communications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130101529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}