{"title":"Negative Bias Temperature Instability Benefits on Power Reduction Techniques","authors":"Sreekala K S, S. Krishnakumar","doi":"10.1109/ICCSDET.2018.8821223","DOIUrl":"https://doi.org/10.1109/ICCSDET.2018.8821223","url":null,"abstract":"This article stabilizes the significant link between static power and reliability. More particularly, shows the general leakage reduction techniques provide a valid solution to reduce leakage current under Negative Bias Temperature Instability (NBTI) condition. The state preserving leakage reduction techniques reduces the leakage power effectively, while the NBTI on PMOS transistor increases the threshold voltage which leads to the further leakage and total power reduction. This work investigates the effect of NBTI on leakage power reduction techniques. Three state preserving power reduction techniques namely Forced Stacking, Sleepy Stack and Feedback Sleeper-Stack circuit techniques have been applied to C17 logic circuit to show that leakage power, total power, and power-delay products take benefits from NBTI-induced aging. The result shows that Feedback Sleeper-Stack techniques with NBTI achieve 90% leakage reduction, 64.6% total power reduction, 50.8% performance improvement with a delay penalty of 28% over the base case in 2 year under iso-area condition.","PeriodicalId":157362,"journal":{"name":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Challenges in Computing System, Communication Technology and Protocols in IoT system","authors":"D. Santhadevi, B. Janet","doi":"10.1109/ICCSDET.2018.8821074","DOIUrl":"https://doi.org/10.1109/ICCSDET.2018.8821074","url":null,"abstract":"With the help of cyber-physical system, sensors, actuators, wireless sensor network, personal area network, wireless communication of near field communication, RFID and conventional internet, it is possible to impart intelligence to devices and make them smarter. IoT (Internet of Things) inter-connects numerous devices from anywhere at any time. All the industries are moving towards adopting IoT due to its ability to automate the operations that enable remote monitoring. The major challenges implementing IoT are interoperability, computation, standardization, privacy, and security. This paper analyses security challenges in the existing protocol, communication technology, and computation techniques.","PeriodicalId":157362,"journal":{"name":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127211481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. John, R. Muraleedharan, Deepu E Koshy, Jineeth Joseph
{"title":"FEM Analysis of 200kVA High Frequency Transformer for Solid State Traction Converters","authors":"N. John, R. Muraleedharan, Deepu E Koshy, Jineeth Joseph","doi":"10.1109/ICCSDET.2018.8821143","DOIUrl":"https://doi.org/10.1109/ICCSDET.2018.8821143","url":null,"abstract":"The solid state transformers (SST) which consists of a medium or high frequency transformer together with the use of power electronic converters is an emerging technology in many applications, mainly in electric traction. These transformers that are used in between high power high frequency converters need proper design in maintaining the system performance under normal as well as in the case of any fault condition. The finite element method (FEM) analysis helps to find numerical solutions of parameters associated with the transformer under consideration. The transformer for the proposed system is designed for 200kVA rated power at an operating frequency of 1.5 kHz. The parameters of this transformer under normal operating conditions and during abnormal conditions caused by converter faults and lightning impulses were simulated and analyzed using FEM. The analysis of the FEM model developed in ANSYS software validates suitability of the transformer during the operation.","PeriodicalId":157362,"journal":{"name":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124033846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Gain and Bandwidth Performance of a Rectangular Microstrip Patch Antenna using Conventional Techniques in a Novel Sense","authors":"Deepanshu Kaushal, T. Shanmuganantham","doi":"10.1109/ICCSDET.2018.8821215","DOIUrl":"https://doi.org/10.1109/ICCSDET.2018.8821215","url":null,"abstract":"The technique of extending the width of the patch and that of introducing slots in the patch and the groundare exploited to enhance the gain and bandwidth performance of a basic rectangular microstrip patch antenna. The used techniques, though conventional but the sense in which they are employed is unique. The rectangular patch antenna geometry considered at the primary stage has been simulated. The extension in the width of the patch to improve gain is achieved in each of the four steps. In the fifth stage, slot is introduced into the patch resulting into appearance of an additional band. The final stage witnesses an introduction of identical slots into the ground that would result into an improved bandwidth. The designsof the two final stages have been fabricated and validated. The measured results have been found to be in close agreement to the simulated results","PeriodicalId":157362,"journal":{"name":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128939349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crime Intention Detection System Using Deep Learning","authors":"Umadevi V Navalgund, P. K.","doi":"10.1109/ICCSDET.2018.8821168","DOIUrl":"https://doi.org/10.1109/ICCSDET.2018.8821168","url":null,"abstract":"Circuit Television Cameras (CCTV’s) are widely used to control occurrence of crimes in the surroundings. Although CCTV’s are deployed at various public and private areas to monitor the surroundings there is no improvement in the control of crimes. This is because CCTV requires human supervision which may lead to human prone errors like missing of some important crime events by human while monitoring so many screens recorded by CCTV’s at same time. To overcome this issue, we came up with Crime Intension Detection System that detects crime in real time videos, images and alerts the human supervisor to take the necessary actions. To alert the supervisors or nearby police station about the occurrence of crime. We added SMS sending module to our system which sends SMS to concern person whenever crimes are detected. The proposed system is implemented using Pre-trained deep learning model VGGNet-19 which detects gun and knife in the hand of person pointing to some other person. We also compared the working of two different pre-trained models like GoogleNet InceptionV3 in training. The results obtained with VGG19 are more accurate in terms of training accuracy. This motivated us to use VGG19 with little fine tuning to detect crime intention in videos and images to overcome the issues with existing approaches with more accuracy. And we made use of Fast RCNN and RCNN these algorithms are well known as Faster RCNN this helps us to draw the bounding box over objects in images like person, gun, knife and some untrained images are marked with N/A. Algorithms help for detection and classifications of objects over images.","PeriodicalId":157362,"journal":{"name":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132673789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection of Wormhole Attack in IoT: A Review","authors":"Minalini Goyal, M. Dutta","doi":"10.1109/ICCSDET.2018.8821160","DOIUrl":"https://doi.org/10.1109/ICCSDET.2018.8821160","url":null,"abstract":"Internet of Things is a new paradigm that is rapidly making progress in the present wireless communications. It semantically implies a worldwide network of connected objects, uniquely addressable based on standard communication protocols. IPv6 Routing Protocol for Low- Power and Lossy Network is considered as a core communication standard for IoT. Even though RPL offers a set of mechanism to make certain the safety of communication, the shared and open nature of IoT makes it evidently susceptible to numerous security attacks like Sinkhole attack, Wormhole attack, Hello flood attack, Sybil attack, Blackhole attack and etc. Wormhole attack is an internal attack which listens to the network activities without changing it, consequently making it extremely hard to identify the attack. Our paper targets to explore the current detection mechanism utilized as a part of identifying the wormhole attack in IoT based-networks. This paper classifies and exhibits every mechanism as per certain perspectives.","PeriodicalId":157362,"journal":{"name":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Chand, K. Bhargavi, R. S. Kiran, M. Kaushik, D. R. Prashanthi, S. S. Kumar
{"title":"SAMRAKSHA : Developing a real-time and automatic early warning system for forest fire","authors":"A. Chand, K. Bhargavi, R. S. Kiran, M. Kaushik, D. R. Prashanthi, S. S. Kumar","doi":"10.1109/ICCSDET.2018.8821124","DOIUrl":"https://doi.org/10.1109/ICCSDET.2018.8821124","url":null,"abstract":"A forest fire is an uncontrollable fire occurring in nature. The forest fires are so ravishing and have a spreading nature such that it takes a heavy period for firefighting crews to take control over the situation.Forest fires causes imbalances in nature and endangers bio-diversity by reducing faunal and floral wealth. Traditional methods of fire prevention are not proving effective and it is now essential to raise public awareness on the forest fires, particularly among people who live closer to forest areas.The forest fires mainly varies from year to year basis and quite a quite a long time elapse between forest fires that are considered to be large. Even the climatic conditions matters the cause of extent of forest fires. Forest fires are more vulnerable in spring and summer seasons. Weather conditions such as precipitation and wind, as well as out of terrain are important factors in determining the size of forest fire. By the estimation levels of research that most of the forest fires are caused mainly due to human, although the causes of a significant number of forest fires remains unknown.","PeriodicalId":157362,"journal":{"name":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130654700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Sindhanaiselvi, S. Keerthikaa, T. Shanmuganantham
{"title":"Energy Efficient Modern Home Using Smart Boards for IoT Energy Automation","authors":"D. Sindhanaiselvi, S. Keerthikaa, T. Shanmuganantham","doi":"10.1109/ICCSDET.2018.8821228","DOIUrl":"https://doi.org/10.1109/ICCSDET.2018.8821228","url":null,"abstract":"This paper mainly focuses on energy consumption and IOT based home automation. Today scientists are prioritized to focuss on energy consumption due to increase in energy demands, hike in energy prices, global warming and waste of energy. The key factor is to reduce energy consumption. This is achieved by increasing the visibility and awareness of energy consumption from homes using the Internet of Things paradigm. As energy consumption starts in home, the real time energy consumption data from each appliance is collected, analyzed and control mechanism is used control the appliances to save energy. Home level implementation is being briefly discussed with the hardware prototype developed and detailed calibrations are presented in this paper.","PeriodicalId":157362,"journal":{"name":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131229950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Review of various Hand Detection Approaches","authors":"S. Gulati, Rosepreet Kaur Bhogal","doi":"10.1109/ICCSDET.2018.8821238","DOIUrl":"https://doi.org/10.1109/ICCSDET.2018.8821238","url":null,"abstract":"Hand detection is the foremost step that is utilized for achieving hand related applications such as hand gesture recognition for human-machine interface, virtual gaming, hand- controllable screens and interfaces, for security purposes to keep eye on the suspicious activities, in sports, in pose estimation, for robotic applications (human-robot interaction) and many more. Thus, this means that effective hand detection is necessary as the accuracy of further tasks to be applied directly depend on the precise detection of hands. So, the results are directly depended upon the efficient detection of hands. This paper includes the review on various hand detection techniques carried out in literature and gives their comparative analysis.","PeriodicalId":157362,"journal":{"name":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128131318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Efficient Detection-Removal Algorithm for Selective Forwarding Attack In Wireless Sensor Networks","authors":"T. Sreelakshmi, G. Binu","doi":"10.1109/ICCSDET.2018.8821213","DOIUrl":"https://doi.org/10.1109/ICCSDET.2018.8821213","url":null,"abstract":"Wireless sensor networks (WSNs) propose the promise of a flexible, low cost solution for monitoring critical infrastructure. Sensor networks have been recommended for applications such as traffic monitoring, military and battlefield surveillance. Wireless sensor networks are more prone to security attacks due to their broadcasting nature of the transmission medium and unattended deployment of nodes in hostile and unfriendly areas where they are not protected as compared to wired networks. Attackers can deploy various types of security attacks to obstruct the security of WSNs. Network layer attacks are more severe since if the routing information is disregarded, disturbances may bring about routing loops, changing of routes etc. Selective forwarding attack is a type of active attack affecting network layers that selectively drops or refuses to forward the data packets. This paper discusses about an energy efficient detection-removal algorithm for effective detection of selective forwarding attack in a clustered WSN scenario. The impact of the malicious node in network parameters like packet delivery ratio, throughput, residual energy of network and end to end delay are analyzed.","PeriodicalId":157362,"journal":{"name":"2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128362493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}