{"title":"Reducing Power in Content-Addressable Memory by pseudo nMOS Cell","authors":"N.Naveen Kumar, K.Suresh Kumar, R.Manasa Reddy","doi":"10.1109/ICESE46178.2019.9194694","DOIUrl":"https://doi.org/10.1109/ICESE46178.2019.9194694","url":null,"abstract":"content address memory a huge bulk of power is broadly distribute charge and recharging utmost of this game follow on utmost course. That new small power content address memory cell along a individual bit edge architecture act scheduled via break this difference capability of the cam design. This scheduled content address memory cell can break almost half of huge co-actions filling and the ordinarily convert about two reciprocal bus lines follows. The content address memory conversation route architecture is fixed pseudo N metal oxide semiconductor sense framework along a preoccupation way is recycled to forcefully bypass the ordinarily convert in same lines. The content address memory arrangement is situated on Complementary Metal-Oxide Semiconductor action among2.5Volts power supply voltage. The capability utilization of this scheduled content address memory is 16.38mW bottom 300mhz operations.","PeriodicalId":137459,"journal":{"name":"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121606262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N.Manisha Reddy, P. Poojitha, M.Ajay Kumar, K. Ramya
{"title":"Reducing the Sensing Errors by Adopting the Effective Matched Filter Threshold Estimation in Lower SNR Conditions","authors":"N.Manisha Reddy, P. Poojitha, M.Ajay Kumar, K. Ramya","doi":"10.1109/ICESE46178.2019.9194668","DOIUrl":"https://doi.org/10.1109/ICESE46178.2019.9194668","url":null,"abstract":"Cognitive-Radio Network (CRN) is an enabling and promising technology to enhance the spectrum utilization and the key functionality of cognitive radio (CR) systems is spectrum sensing in order to function in an unoccupied spectral bands. To safe-guard the presence of licensed users from any interference in a spectrum, CR should be capable of detecting reigning channels even in the scenario of low signal to noise ratio (SNR). Here, in this article, various spectrum-sensing parameters such as detection probability, bit error probability (BEP), miss-detection probability, probability of false alarm are amended in the case of lower SNR by employing demand and need based genetic-algorithm(GA) by considering geographical disparities of spectrum-holes. The outcomes convey that the GA can provide a finer real-time solution for the sensing capability of a cognitive-radio network.","PeriodicalId":137459,"journal":{"name":"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)","volume":"121 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132719965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Homomorphic verifiable Group Signature Mechanism for Shared Cloud Data","authors":"P. Reddy, A.Swetha Priva","doi":"10.1109/ICESE46178.2019.9194635","DOIUrl":"https://doi.org/10.1109/ICESE46178.2019.9194635","url":null,"abstract":"Nowadays, cloud storages will become one of the important service that which allows employees to be more flexible with data in their work practices. The reliability of public cloud is weak to hardware, software or human mistakes. To make certain the reliability of the shared information, a few techniques were planned to permit public verifiers to efficaciously audit information integrity with protecting customer's information. Unlikely, community audit going on the reliability of collective information may also display records proprietors' vital data to the third party assessor. Here, we suggest a new Privacy-Aware Public Auditing system designed for shared cloud facts through building a similar demonstrable institution signature. Dissimilar the accessible answers, our plan require as a minimum grouping managers to get better a trace key considerately eliminates misuse of single-authority influence there by presents non frame ability. Furthermore, our plan guarantees that group customers can hint facts adjustments thru certain binary tree and can get better modern day correct facts block when the information block is broken. In addition, the protection evaluation and experimental analysis suggest that our scheme is protected and competent.","PeriodicalId":137459,"journal":{"name":"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multilevel Pipelined Processing for Aerial Image Restoration","authors":"V. Prasad, P. Kumar, S. Bachu","doi":"10.1109/ICESE46178.2019.9194619","DOIUrl":"https://doi.org/10.1109/ICESE46178.2019.9194619","url":null,"abstract":"Aerial images can get distorted due to various factors. During the acquisition of the images, it may get corrupted by distinct types of noises, camera misalignment etc. The restoration of degraded images has been a very important factor in the fields of medical, surveillance etc. Many algorithms in image processing do exist to restore degraded images but the efficiency of those in restoring the images is less. In this work, the aerial images are processed through various stages such as color stabilization, saturation enrichment and contrast improvement. In color stabilization, the color intensities (green, red, and blue) are globally adjusted. In saturation enrichment, to increase the saturation of an input aerial image, color of each pixel is projected onto bisectors of an green, red and blue color cube. And in contrast improvement, it is used to enrich the image quality by using the principle of unsharp masking. Real world aerial images were used to obtain the restored images. This work is verified for various input aerial images and the obtained restored images are verified qualitatively and quantitatively.","PeriodicalId":137459,"journal":{"name":"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125560624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Susrutha, K. Mallikarjun, M. A. Kumar, M. Ashok
{"title":"Analysis on FFT and DWT Transformations in Image Processing","authors":"G. Susrutha, K. Mallikarjun, M. A. Kumar, M. Ashok","doi":"10.1109/ICESE46178.2019.9194662","DOIUrl":"https://doi.org/10.1109/ICESE46178.2019.9194662","url":null,"abstract":"An Image processing is a coming out research which needs heed in bio-medical field. There are many image processing methods which are useful to bring out information for analysis, memory space and conserves computing time. Transformation is one of image processing techniques. Some of the transformation techniques are wavelet transform, Hilbert transform, Radon Transform, Fourier transform etc. Transformation techniques are chosen based on their applications, advantages and disadvantages. The wavelet transformation be a technique which equates time domain and frequency domain. It is exactly as popular as the time-frequency representation of a non -stationary signal. Where Fourier transform breaks down the image into real and imaginary components, which is nothing but representation of image in frequency domain. In this paper, discrete wavelet transform using Haar and fast Fourier transform are applied on images using MATLAB 2018a","PeriodicalId":137459,"journal":{"name":"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125680352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Verification Item Requesting Technique by way of Adopting Paillier Encryption Algorithm","authors":"L. Priyanka, P. Vijay Kumar, K. Jyothsna Reddy","doi":"10.1109/ICESE46178.2019.9194691","DOIUrl":"https://doi.org/10.1109/ICESE46178.2019.9194691","url":null,"abstract":"A defended exploration strategies over encrypted cloud statistics permit an authorized consumer to query records files of interest with the aid of using filing encrypted query key phrases to the cloud server in a privateness-retaining manner. However, in exercise, the lower again query effects can also moreover furthermore be incorrect or incomplete inside the dishonest cloud environment. For instance, the cloud server also can intentionally miss a few certified consequences to computing sources and conversation overhead. Thus, a first-class-functional defended query framework want to provide a question results verification mechanism that lets in the statistics user to confirm consequences. On this paper, we construct a included, successfully unified, and notable-grained query effects authentication framework, by means of which, given an encrypted query outcomes set, the query character not most effective can affirm the correctness of every information document inside the set however can also similarly take a look at how many or which certified records documents aren't rebound if the set is incomplete earlier than decryption. The verification scheme is unfastened-coupling to concrete at ease are attempting to find techniques and may be very consequences easily included into any relaxed query scheme. We obtain the intention thru building defended verification item for encrypted cloud facts. Furthermore, a quick signature technique with extensively small garage charge is planned to guarantee the authenticity of verification object and a verification item request technique is offered to allow the question consumer to securely achive the favored verification item performance evaluation shows that the planned schemes are feasible and adequate.","PeriodicalId":137459,"journal":{"name":"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134561145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilization of Data Mining Methods to Investigate Crop Yield Forecast","authors":"P. Srinivas, P. Santhuja","doi":"10.1109/ICESE46178.2019.9194693","DOIUrl":"https://doi.org/10.1109/ICESE46178.2019.9194693","url":null,"abstract":"Environmental vary and the shrink of accessible farming area are two of the mainly significant elements that influence worldwide food production particularly as far as wheat stores. A regularly expanding total population puts an immense interest on these assets. Thusly, there is a critical need to improve sustenance creation. This examination investigates another methodology in the manner analyses are done. This is done through the presentation of new strategies for examinations, for example, data mining and online analytical process in the approach. Also, this study endeavours to give a superior comprehension of the impacts of both steady variety factors, for example, soil type, precipitation and temperature on the crop yields. The study activities exposed that crop yield was mainly reliant upon precipitation and temperature. Also, it demonstrated that precipitation consistently influenced the temperature and soil type because of the moisture maintenance of yield developing areas. Outcome from the regression analyses, demonstrated that the statistical forecast of crop yields from past data, might be upgraded by data mining methods.","PeriodicalId":137459,"journal":{"name":"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126015623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stratification of Parkinson Disease using python scikit-learn ML library","authors":"A. Kolte, B. Mahitha, N. Raju","doi":"10.1109/ICESE46178.2019.9194627","DOIUrl":"https://doi.org/10.1109/ICESE46178.2019.9194627","url":null,"abstract":"Parkinson's disease is a disorder in the central nervous system which affects in the movement functions of the body. It is a chronic disease with the symptoms growing with time. It generally affects the older people when their symptoms gradually increase to a maximum. The disease can affect the basic functions of the body such as hearing, walking, talking etc. The analysis of this disease can be done with the help of generic machine learning algorithms which produce varying accuracies. Thus, the best one is chosen which will provide the highest accuracy in predicting if the disease is present in the patient or not. The dataset is taken from the UCI machine learning repository namely-Parkinson disease dataset with replicated acoustic features. There are 48 features present in the dataset pertaining to the disease for 240 patients. Various machine learning techniques that are utilized compared their efficiency in the classification. Thus, the best one is chosen with the highest accuracy since the applications in healthcare generally requires more accuracy and efficiencies cannot be compromised. The significant models that are used in this process are naaive bayes classifier, gradient boosting, support vector machines. These techniques can be very powerful for the doctors in order to predict the disease by analysing the features present in the patients.","PeriodicalId":137459,"journal":{"name":"2019 International Conference on Emerging Trends in Science and Engineering (ICESE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114223825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}